First, what is a hacker?
The term “hacker” can mean two different things:
- Someone who is very good at computer programming, networking, or other related computer functions and loves to share their knowledge with other people
- Someone who uses their expert computer skills and knowledge to gain unauthorized access to systems, corporations, governments, or networks, in order to cause problems, delays, or lack of access.
What most people think of when they hear the term “hacker”
The word “hacker” does not bring the best of thoughts to most people’s minds. The popular definition of a hacker is someone who intentionally breaks into systems or networks to illegally procure information or infuse chaos into a network for the express purpose of control. Hackers are not usually associated with doing good deeds; in fact, the term “hacker” is often synonymous with “criminal” to the public. These are black-hat hackers or “crackers”, the people we hear about on the news creating chaos and pulling down systems. They maliciously enter secure networks and exploit flaws for their own personal (and usually malicious) gratification.
There are different kinds of hackers
However, in the hacker community, there are subtle class differences that the general public is not aware of. There are hackers who break into systems that don’t necessarily destroy them, who have the public’s best interest at heart.
These people are white-hat hackers, or “good hackers.” White-hat hackers are those individuals who break into systems to point out security flaws or bring attention to a cause. Their intentions are not necessarily to wreak havoc but to do a public service.
Hacking as a public service
White-hat hackers are also known as ethical hackers; they are hackers who are working from the inside of a company, with the company’s full knowledge and permission, who hack into the company’s networks to find flaws and present their reports to the company.
The deployment of ethical hackers to test the vulnerability of computer networks is one of the many ways CSC can help clients deal with ongoing security threats.” These cyber security experts look for flaws in the system and repair them before the bad guys can exploit them.
Getting a job as a hacker
Although white-hat hackers are not necessarily recognized as much as they should be, more and more companies are looking for people who can stay ahead of the individuals determined to bring their systems down. By hiring white-hat hackers, companies have a fighting chance. Even though these programming gurus were once considered outcasts in the public eye, many hackers now hold critical and extremely high-paying jobs with corporations, governments, and other organizations.
Examples of famous hackers
Black Hat
Anonymous: A loosely associated group of hackers from all over the world, with meeting points on various online message boards and social networking forums. They are most known for their efforts to encourage civil disobedience and/or unrest through defamation and defacement of various websites, denial of service attacks, and the online publishing of personal information.
Jonathan James: Infamous for hacking into the Defense Threat Reduction Agency and stealing software code.
Adrian Lamo: Known for infiltrating several high-level organizations’ networks, including Yahoo, the New York Times, and Microsoft to exploit security flaws.
Kevin Mitnick: Convicted for multiple criminal computer crimes after evading authorities on an extremely well-publicized chase for two and a half years. After serving time in federal prison for his actions, Mitnick founded a cyber security firm to help businesses and organizations keep their networks safe.
White Hat
Tim Berners-Lee: Best known for inventing the World Wide Web, HTML, and the URL system.
Vinton Cerf: Known as the “father of the Internet”, Cerf has been highly instrumental in creating the Internet and the Web as we use it today.
Dan Kaminsky: Highly respected security expert best known for his role in uncovering the Sony BMG copy protection rootkit scandal.
Ken Thompson: Co-created UNIX, an operating system, and the C programming language.
Donald Knuth: One of the most influential people in the field of computer programming and theoretical computer science.
Larry Wall: Creator of PERL, a high-level programming language that can be used for a wide variety of tasks.
Hackers: not a black or white issue
While most of the exploits we will hear about in the news come from people who have malicious intentions, there are much more incredibly talented and dedicated people who are using their hacking skills for the greater good. It’s important to understand the difference.