Table of Contents
47 relations: Black and white hat symbolism in film, Black hat (computer security), Bug (engineering), Bug bounty program, Burp Suite, Computer Misuse Act 1990, Computer security, Countermeasure, Dan Farmer, DEF CON, Denial-of-service attack, Exploit (computer security), Government of China, Grey hat, Internet, Intranet, IT risk, Memory forensics, Metasploit, Multics, National CSS, National Security Agency, Nessus (software), Network security, Newsweek, Out-Law.com, Password cracking, Penetration test, Red team, Reverse engineering, Security Administrator Tool for Analyzing Networks, Security hacker, Social engineering (security), Social network, Tamer Şahin, The New York Times, Tiger team, United States Air Force, United States Armed Forces, United States Department of Defense, USB, Vulnerability, Vulnerability (computer security), W3af, Western (genre), Wietse Venema, Wireless identity theft.
- Computer ethics
Black and white hat symbolism in film
In American films of the Western genre between the 1920s and the 1940s, white hats were often worn by heroes and black hats by villains to symbolize the contrast in good versus evil.
See White hat (computer security) and Black and white hat symbolism in film
Black hat (computer security)
A black hat (black hat hacker or blackhat) is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. White hat (computer security) and black hat (computer security) are Hacking (computer security).
See White hat (computer security) and Black hat (computer security)
Bug (engineering)
In engineering, a bug is a design defect in an engineered system that causes an undesired result.
See White hat (computer security) and Bug (engineering)
Bug bounty program
A bug bounty program is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. White hat (computer security) and bug bounty program are Hacking (computer security).
See White hat (computer security) and Bug bounty program
Burp Suite
Burp Suite is an industry-standard tool for modern security assessment and penetration testing of web applications.
See White hat (computer security) and Burp Suite
Computer Misuse Act 1990
The Computer Misuse Act 1990 (c. 18) is an act of the Parliament of the United Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063. White hat (computer security) and Computer Misuse Act 1990 are Hacking (computer security).
See White hat (computer security) and Computer Misuse Act 1990
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer systems and networks from threats that may result in unauthorized information disclosure, theft of (or damage to) hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
See White hat (computer security) and Computer security
Countermeasure
A countermeasure is a measure or action taken to counter or offset another one.
See White hat (computer security) and Countermeasure
Dan Farmer
Dan Farmer (born April 5, 1962) is an American computer security researcher and programmer who was a pioneer in the development of vulnerability scanners for Unix operating systems and computer networks.
See White hat (computer security) and Dan Farmer
DEF CON
DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada.
See White hat (computer security) and DEF CON
Denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network.
See White hat (computer security) and Denial-of-service attack
Exploit (computer security)
An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
See White hat (computer security) and Exploit (computer security)
Government of China
The government of the People's Republic of China is based on a system of people's congress within the parameters of a unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's congresses.
See White hat (computer security) and Government of China
Grey hat
A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. White hat (computer security) and grey hat are Hacking (computer security).
See White hat (computer security) and Grey hat
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
See White hat (computer security) and Internet
Intranet
An intranet is a computer network for sharing information, easier communication, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.
See White hat (computer security) and Intranet
IT risk
Information technology risk, IT risk, IT-related risk, or cyber risk is any risk relating to information technology.
See White hat (computer security) and IT risk
Memory forensics
Memory forensics is forensic analysis of a computer's memory dump.
See White hat (computer security) and Memory forensics
Metasploit
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
See White hat (computer security) and Metasploit
Multics
Multics ("MULTiplexed Information and Computing Service") is an influential early time-sharing operating system based on the concept of a single-level memory.
See White hat (computer security) and Multics
National CSS
National CSS, Inc. (NCSS) was a time-sharing firm in the 1960–80s, until its acquisition by Dun & Bradstreet in 1979.
See White hat (computer security) and National CSS
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI).
See White hat (computer security) and National Security Agency
Nessus (software)
Nessus is a proprietary vulnerability scanner developed by Tenable, Inc.
See White hat (computer security) and Nessus (software)
Network security
Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
See White hat (computer security) and Network security
Newsweek
Newsweek is a weekly news magazine.
See White hat (computer security) and Newsweek
Out-Law.com
Out-Law.com is a legal news and information site developed by international law firm Pinsent Masons.
See White hat (computer security) and Out-Law.com
Password cracking
In cryptanalysis and computer security, password cracking is the process of guessing passwords protecting a computer system.
See White hat (computer security) and Password cracking
Penetration test
A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment.
See White hat (computer security) and Penetration test
Red team
A red team is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses.
See White hat (computer security) and Red team
Reverse engineering
Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little (if any) insight into exactly how it does so.
See White hat (computer security) and Reverse engineering
Security Administrator Tool for Analyzing Networks
Security Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerability scanner for analyzing networked computers.
See White hat (computer security) and Security Administrator Tool for Analyzing Networks
Security hacker
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. White hat (computer security) and security hacker are Hacking (computer security).
See White hat (computer security) and Security hacker
Social engineering (security)
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information.
See White hat (computer security) and Social engineering (security)
Social network
A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors.
See White hat (computer security) and Social network
Tamer Şahin
Tamer Şahin (born August 10, 1981 in İzmir, Turkey) is a Turkish white hat hacker.
See White hat (computer security) and Tamer Şahin
The New York Times
The New York Times (NYT) is an American daily newspaper based in New York City.
See White hat (computer security) and The New York Times
Tiger team
A tiger team is a team of specialists assembled to work on a specific goal, or to solve a particular problem. White hat (computer security) and tiger team are Hacking (computer security).
See White hat (computer security) and Tiger team
United States Air Force
The United States Air Force (USAF) is the air service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States.
See White hat (computer security) and United States Air Force
United States Armed Forces
The United States Armed Forces are the military forces of the United States.
See White hat (computer security) and United States Armed Forces
United States Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the U.S. government directly related to national security and the United States Armed Forces.
See White hat (computer security) and United States Department of Defense
USB
Universal Serial Bus (USB) is an industry standard that allows data exchange and delivery of power between many types of electronics.
See White hat (computer security) and USB
Vulnerability
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves the analysis of the risks and assets of disadvantaged groups, such as the elderly.
See White hat (computer security) and Vulnerability
Vulnerability (computer security)
Vulnerabilities are flaws in a computer system that weaken the overall security of the system. White hat (computer security) and Vulnerability (computer security) are Hacking (computer security).
See White hat (computer security) and Vulnerability (computer security)
W3af
w3af (Web Application Attack and Audit Framework) is an open-source web application security scanner.
See White hat (computer security) and W3af
Western (genre)
The Western is a genre of fiction typically set in the American frontier (commonly referred to as the "Old West" or the "Wild West") between the California Gold Rush of 1849 and the closing of the frontier in 1890, and commonly associated with folk tales of the Western United States, particularly the Southwestern United States, as well as Northern Mexico and Western Canada.
See White hat (computer security) and Western (genre)
Wietse Venema
Wietse Zweitze Venema (born 1951) is a Dutch programmer and physicist best known for writing the Postfix email system.
See White hat (computer security) and Wietse Venema
Wireless identity theft
Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual’s personal identifying information using wireless (radio frequency) mechanics." Numerous articles have been written about wireless identity theft and broadcast television has produced several investigations of this phenomenon.
See White hat (computer security) and Wireless identity theft
See also
Computer ethics
- Computer ethics
- Cyberethics
- Dark pattern
- Data care
- Free software
- Internet ethics
- Programming ethics
- Trust management (information system)
- White hat (computer security)
References
Also known as Anti hacker, Anti-Hacker, Ethical Hacker, Ethical Hacking, White Hat, White hat (computing), White hat hacker, White-hat, White-hat hacker, White-hats, WhiteHat Adda, Whitehat, Whitehats.