Vritti January, 2016 | Page 6

6 January 2016 Technically Speaking black-market. Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Once they have gained control over a system, they may apply patches or fixes to the system to retain their control over the system. White hat hackers: These are the good guys of hacking authorized to perform testing. You can call your internal security tester or third party you have authorized to perform security testing on your infrastructure/application as white hat hackers. White hat hacker takes all necessary permission and discloses all the findings to the owner of the system. White hat hacker does not reveal any information of the system to any other party not authorized to have such information. Grey hat hackers: As the name suggests, they lie in between Black hat and White hat. Grey hat hacker is somebody who has not been authorized by the organization to perform attack/testing on its application/infrastructure. But still grey hat hacker does so and responsibly reports to the organization about any security finding. He may charge the organization for fixing the issue. But remember, testing without permission is still illegal. Red Team: This is a comparatively new concept and it is gaining popularity among security conscious people (even among government and the military establishment). The Red team is a team of security experts who try to break into the organization's security systems by attacking it like a hacker. They will use all possible attack vectors including social engineering to break into unauthorized system. Usually they )