WHAT IS A HACKER, DEFINITION AND SOME TYPES

Without a doubt, hacker is a word that has a negative connotation. In fact, not a few people think that hackers are criminals who harm many people. However, are hackers really always associated with illegal acts on the internet and the biggest threat to cybersecurity? Well in this article, we will discuss everything you need to know about what a hacker is, from understanding to its types. Let’s just get started.

What are Hackers?

If referring to the Cambridge dictionary, a hacker or computer hacker is a person who enters someone else’s computer system without the owner’s permission. Its purpose is to access certain data or perform various other illegal acts. Oxford Learner’s Dictionaries also have a definition that is not much different. Hacker is defined as someone who uses his computer to access data on other people’s computers or cellphones without the owner’s consent.

Not to forget, the media also describes hackers as “bad guys” or people who commit cyber crimes. In ZDNet’s article entitled “A hacker is selling access to the email accounts of hundreds of C-level executives”, for example. In the article, the hacker is described as a malicious actor who hacks into hundreds of accounts and sells them for some money.

Types of Hackers

So, are hackers always associated with cybercriminals? Of course not. Currently there are many types of hackers who certainly have different hacking goals. The types of hackers are as follows:

1. White Hat Hacker

White hat hackers are hackers who help a business find loopholes in their security system, then provide solutions to address those problems. This type of hacker who is also often called an ethical hacker is also often used to protect online businesses and organizations from various kinds of cybercrimes.

2. Black Hat Hackers

The opposite of white hat hackers, black hat hackers are those who exploit security holes in systems and software. The purpose of these exploits is generally to spread malware, steal data, take over or even disable the target device.

3. Gray Hat Hacker

Gray hat hackers are in the middle between white and black hat hackers. Hackers will indeed access a system or network without the owner’s permission, but the goal is not to commit a crime. Perpetrators usually look for security weaknesses in the system or network, and then offer solutions to overcome these vulnerabilities in exchange for certain.

4. Red Hat Hackers

Red hat hackers are those who try to find black hat hackers and stop their attempts to hack a system or network. This type of hacker often takes over the weapons used by black hat hackers and uses them to attack their devices (black hat hackers).

5. Blue Hat Hacker

Blue hat hackers are those who hack the devices or networks of individuals, businesses, or organizations to carry out retaliatory attacks. It could be that the perpetrator is a consumer, former employee, or other party who is dissatisfied and angry with the treatment they receive.

6. Green Hat Hackers

Green hat hackers refer to hackers who are just starting out and learning to hone their skills in the world of hacking. Usually, this type of hacker has a strong ambition to improve their skills in order to gain recognition from the hacker community.

7. Script Kiddie

Script kiddie doesn’t develop their own software, but downloads programs that are already available on the internet. The danger, script kiddie will use the software to launch a DDoS attack against your server or network.

In addition to the seven types above, there are also several other categories of hackers, including hacktivists, social engineering hackers, elite hackers, state sponsored hackers, cyber terrorists, and whistleblower hackers.

So What Are Hackers?

After reading this article, of course, you will understand more and more that hackers don’t always refer to cybercriminals as many people think. Even at first, hacker is a term that is intended for those who have skills and understand computers, programming, and networks. Then, they use this understanding for various purposes, ranging from improving security systems, protecting data, or developing useful applications or tools.