Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
White hat (computer security)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Computer hacker who hacks ethically}} {{Computer hacking}} A '''white hat''' (or a '''white-hat hacker''', '''a whitehat''') is an ethical [[security hacker]].<ref>{{cite web |url=http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html |title=What is white hat? - a definition from Whatis.com |publisher=Searchsecurity.techtarget.com |access-date=2012-06-06 |archive-date=2011-02-01 |archive-url=https://web.archive.org/web/20110201231325/http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html |url-status=live }}</ref><ref>{{Cite journal |last1=Okpa |first1=John Thompson |last2=Ugwuoke |first2=Christopher Uchechukwu |last3=Ajah |first3=Benjamin Okorie |last4=Eshioste |first4=Emmanuel |last5=Igbe |first5=Joseph Egidi |last6=Ajor |first6=Ogar James |last7=Okoi |first7=Ofem, Nnana |last8=Eteng |first8=Mary Juachi |last9=Nnamani |first9=Rebecca Ginikanwa |date=2022-09-05 |title=Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria |journal=SAGE Open |language=en |volume=12 |issue=3 |page=215824402211227 |doi=10.1177/21582440221122739 |s2cid=252096635 |issn=2158-2440|doi-access=free }}</ref> Ethical hacking is a term meant to imply a broader category than just penetration testing.<ref>{{cite journal |last=Ward |first=Mark |title=Sabotage in cyberspace |journal=New Scientist |volume=151 |issue=2047 |date=14 September 1996 |url=https://www.newscientist.com/article/mg15120471-700-sabotage-in-cyberspace-the-threat-to-national-security-from-computer-terrorists-is-vastly-overblown-most-hackers-are-after-nothing-more-than-an-intellectual-thrill/ |access-date=28 March 2018 |archive-date=13 January 2022 |archive-url=https://web.archive.org/web/20220113120127/https://www.newscientist.com/article/mg15120471-700-sabotage-in-cyberspace-the-threat-to-national-security-from-computer-terrorists-is-vastly-overblown-most-hackers-are-after-nothing-more-than-an-intellectual-thrill/ |url-status=live }}</ref><ref name=Knight>{{cite journal |last=Knight |first=William |title=License to Hack |journal=InfoSecurity |date=16 October 2009 |volume=6 |issue=6 |pages=38β41 |url=http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/ |doi=10.1016/s1742-6847(09)70019-9 |access-date=19 July 2014 |archive-date=9 January 2014 |archive-url=https://web.archive.org/web/20140109211618/http://www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/ |url-status=live |url-access=subscription }}</ref> Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has.<ref>{{Cite journal |last1=Filiol |first1=Eric |last2=Mercaldo |first2=Francesco |last3=Santone |first3=Antonella |date=2021 |title=A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach |journal=Procedia Computer Science |language=en |volume=192 |pages=2039β2046 |doi=10.1016/j.procs.2021.08.210|s2cid=244321685 |doi-access=free }}</ref> The white hat is contrasted with the [[black hat (computer security)|black hat]], a malicious hacker; this definitional dichotomy comes from [[Western (genre)|Western films]], where [[black and white hat symbolism in film|heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively]].<ref>{{Cite book |url=https://books.google.com/books?id=aVnA8pQmS54C&pg=PA26 |title=Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques |first1=Thomas |last1=Wilhelm |first2=Jason |last2=Andress |publisher=Elsevier |year=2010 |pages=26β7|isbn=978-1-59749-589-9 }}</ref> There is a third kind of hacker known as a [[grey hat]] who hacks with good intentions but at times without permission.<ref name="Symantec Group">{{cite web |title=What is the difference between black, white, and grey hackers |url=https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html |website=Norton.com |publisher=Norton Security |access-date=2 October 2018 |archive-date=15 January 2018 |archive-url=https://web.archive.org/web/20180115172110/https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html |url-status=live }}</ref> White-hat hackers may also work in teams called "[[hacker (computer security)|sneakers and/or hacker clubs]]",<ref name= Secpoint>{{cite web |url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |access-date=2012-06-06 |archive-date=2019-05-02 |archive-url=https://web.archive.org/web/20190502061110/https://www.secpoint.com/what-is-a-white-hat.html |url-status=live }}</ref> [[red team]]s, or [[tiger team]]s.<ref name="Palmer">{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769|access-date=2014-07-19|archive-date=2019-05-02|archive-url=https://web.archive.org/web/20190502061107/http://pdf.textfiles.com/security/palmer.pdf|url-status=live}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)