We are working to restore the Unionpedia app on the Google Play Store
OutgoingIncoming
🌟We've simplified our design for better navigation!
Instagram Facebook X LinkedIn

White hat (computer security)

Index White hat (computer security)

A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. [1]

Table of Contents

  1. 47 relations: Black and white hat symbolism in film, Black hat (computer security), Bug (engineering), Bug bounty program, Burp Suite, Computer Misuse Act 1990, Computer security, Countermeasure, Dan Farmer, DEF CON, Denial-of-service attack, Exploit (computer security), Government of China, Grey hat, Internet, Intranet, IT risk, Memory forensics, Metasploit, Multics, National CSS, National Security Agency, Nessus (software), Network security, Newsweek, Out-Law.com, Password cracking, Penetration test, Red team, Reverse engineering, Security Administrator Tool for Analyzing Networks, Security hacker, Social engineering (security), Social network, Tamer Şahin, The New York Times, Tiger team, United States Air Force, United States Armed Forces, United States Department of Defense, USB, Vulnerability, Vulnerability (computer security), W3af, Western (genre), Wietse Venema, Wireless identity theft.

  2. Computer ethics

Black and white hat symbolism in film

In American films of the Western genre between the 1920s and the 1940s, white hats were often worn by heroes and black hats by villains to symbolize the contrast in good versus evil.

See White hat (computer security) and Black and white hat symbolism in film

Black hat (computer security)

A black hat (black hat hacker or blackhat) is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. White hat (computer security) and black hat (computer security) are Hacking (computer security).

See White hat (computer security) and Black hat (computer security)

Bug (engineering)

In engineering, a bug is a design defect in an engineered system that causes an undesired result.

See White hat (computer security) and Bug (engineering)

Bug bounty program

A bug bounty program is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. White hat (computer security) and bug bounty program are Hacking (computer security).

See White hat (computer security) and Bug bounty program

Burp Suite

Burp Suite is an industry-standard tool for modern security assessment and penetration testing of web applications.

See White hat (computer security) and Burp Suite

Computer Misuse Act 1990

The Computer Misuse Act 1990 (c. 18) is an act of the Parliament of the United Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063. White hat (computer security) and Computer Misuse Act 1990 are Hacking (computer security).

See White hat (computer security) and Computer Misuse Act 1990

Computer security

Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer systems and networks from threats that may result in unauthorized information disclosure, theft of (or damage to) hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

See White hat (computer security) and Computer security

Countermeasure

A countermeasure is a measure or action taken to counter or offset another one.

See White hat (computer security) and Countermeasure

Dan Farmer

Dan Farmer (born April 5, 1962) is an American computer security researcher and programmer who was a pioneer in the development of vulnerability scanners for Unix operating systems and computer networks.

See White hat (computer security) and Dan Farmer

DEF CON

DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada.

See White hat (computer security) and DEF CON

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network.

See White hat (computer security) and Denial-of-service attack

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

See White hat (computer security) and Exploit (computer security)

Government of China

The government of the People's Republic of China is based on a system of people's congress within the parameters of a unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's congresses.

See White hat (computer security) and Government of China

Grey hat

A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. White hat (computer security) and grey hat are Hacking (computer security).

See White hat (computer security) and Grey hat

Internet

The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.

See White hat (computer security) and Internet

Intranet

An intranet is a computer network for sharing information, easier communication, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.

See White hat (computer security) and Intranet

IT risk

Information technology risk, IT risk, IT-related risk, or cyber risk is any risk relating to information technology.

See White hat (computer security) and IT risk

Memory forensics

Memory forensics is forensic analysis of a computer's memory dump.

See White hat (computer security) and Memory forensics

Metasploit

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

See White hat (computer security) and Metasploit

Multics

Multics ("MULTiplexed Information and Computing Service") is an influential early time-sharing operating system based on the concept of a single-level memory.

See White hat (computer security) and Multics

National CSS

National CSS, Inc. (NCSS) was a time-sharing firm in the 1960–80s, until its acquisition by Dun & Bradstreet in 1979.

See White hat (computer security) and National CSS

National Security Agency

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI).

See White hat (computer security) and National Security Agency

Nessus (software)

Nessus is a proprietary vulnerability scanner developed by Tenable, Inc.

See White hat (computer security) and Nessus (software)

Network security

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

See White hat (computer security) and Network security

Newsweek

Newsweek is a weekly news magazine.

See White hat (computer security) and Newsweek

Out-Law.com

Out-Law.com is a legal news and information site developed by international law firm Pinsent Masons.

See White hat (computer security) and Out-Law.com

Password cracking

In cryptanalysis and computer security, password cracking is the process of guessing passwords protecting a computer system.

See White hat (computer security) and Password cracking

Penetration test

A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment.

See White hat (computer security) and Penetration test

Red team

A red team is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses.

See White hat (computer security) and Red team

Reverse engineering

Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little (if any) insight into exactly how it does so.

See White hat (computer security) and Reverse engineering

Security Administrator Tool for Analyzing Networks

Security Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerability scanner for analyzing networked computers.

See White hat (computer security) and Security Administrator Tool for Analyzing Networks

Security hacker

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. White hat (computer security) and security hacker are Hacking (computer security).

See White hat (computer security) and Security hacker

Social engineering (security)

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information.

See White hat (computer security) and Social engineering (security)

Social network

A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors.

See White hat (computer security) and Social network

Tamer Şahin

Tamer Şahin (born August 10, 1981 in İzmir, Turkey) is a Turkish white hat hacker.

See White hat (computer security) and Tamer Şahin

The New York Times

The New York Times (NYT) is an American daily newspaper based in New York City.

See White hat (computer security) and The New York Times

Tiger team

A tiger team is a team of specialists assembled to work on a specific goal, or to solve a particular problem. White hat (computer security) and tiger team are Hacking (computer security).

See White hat (computer security) and Tiger team

United States Air Force

The United States Air Force (USAF) is the air service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States.

See White hat (computer security) and United States Air Force

United States Armed Forces

The United States Armed Forces are the military forces of the United States.

See White hat (computer security) and United States Armed Forces

United States Department of Defense

The United States Department of Defense (DoD, USDOD, or DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the U.S. government directly related to national security and the United States Armed Forces.

See White hat (computer security) and United States Department of Defense

USB

Universal Serial Bus (USB) is an industry standard that allows data exchange and delivery of power between many types of electronics.

See White hat (computer security) and USB

Vulnerability

Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves the analysis of the risks and assets of disadvantaged groups, such as the elderly.

See White hat (computer security) and Vulnerability

Vulnerability (computer security)

Vulnerabilities are flaws in a computer system that weaken the overall security of the system. White hat (computer security) and Vulnerability (computer security) are Hacking (computer security).

See White hat (computer security) and Vulnerability (computer security)

W3af

w3af (Web Application Attack and Audit Framework) is an open-source web application security scanner.

See White hat (computer security) and W3af

Western (genre)

The Western is a genre of fiction typically set in the American frontier (commonly referred to as the "Old West" or the "Wild West") between the California Gold Rush of 1849 and the closing of the frontier in 1890, and commonly associated with folk tales of the Western United States, particularly the Southwestern United States, as well as Northern Mexico and Western Canada.

See White hat (computer security) and Western (genre)

Wietse Venema

Wietse Zweitze Venema (born 1951) is a Dutch programmer and physicist best known for writing the Postfix email system.

See White hat (computer security) and Wietse Venema

Wireless identity theft

Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual’s personal identifying information using wireless (radio frequency) mechanics." Numerous articles have been written about wireless identity theft and broadcast television has produced several investigations of this phenomenon.

See White hat (computer security) and Wireless identity theft

See also

Computer ethics

References

[1] https://en.wikipedia.org/wiki/White_hat_(computer_security)

Also known as Anti hacker, Anti-Hacker, Ethical Hacker, Ethical Hacking, White Hat, White hat (computing), White hat hacker, White-hat, White-hat hacker, White-hats, WhiteHat Adda, Whitehat, Whitehats.