A Guide To Hackers

A Guide To Hackers

December 7, 2018 The Beacon Blog, Uncategorized 0 Comments

To people with little knowledge of cyber security, all hackers are bad. Those who know more can distinguish between “black” and “white” hats, but even this is oversimplified. According to a recent post by Julie Tilllyard of DFLabs  (https://www.dflabs.com/blog/hackers-the-good-the-bad-and-the-ugly-find-out-at-black-hat-europe-2018/) there are seven types of hackers:

  • Script Kiddies – non-serious hackers with little knowledge or skills who usually use hacking programs of others.
  • Black Hats – hackers who intentionally commit theft of financial or personal information, or manipulate other people’s computer systems for personal gain.
  • White Hats – hackers who use their skills with the permission of system owners and governments. Working as security analysts they perform penetration testing or vulnerability assessments.
  • Grey Hats – they resemble black hats by breaking into systems without the owner’s permission, but they may share information about system vulnerabilities with the owner – usually for a price.
  • Green Hats – amateur hackers similar to Script Kiddies, but unlike them trying to improve their knowledge and skills.
  • Red Hats – similar to White Hats, but instead of simply reporting Black Hat attacks they will launch their own attacks against the hackers.
  • Blue Hats – novices similar to Script Kiddies, but like Red Hats launch revenge attacks usually using simple methods.

No matter where they fall on this “rainbow”, hackers can still be divided into those operate with system owners’ permission and those who don’t. Protect yourselves against the latter with a security system, and buy Cyber insurance as a backup.




About the Author

Harry Cylinder

Harry Cylinder, CPCU, ARM has spent nearly fifty years in the insurance industry, the majority of the time as a consultant. He has been employed by The Beacon Group of Companies since 2008, specializing in the review and analysis of property and casualty coverage forms. Mr. Cylinder has been reviewing policy forms as they have evolved over the past decades. In 2008 he published an article in the CPCU Journal which was the first description of cyber insurance coverage for a general insurance audience. Since that time he has regularly written on cyber and other topics for The Beacon Companies’ blog.