{Author Name [first-name middle-name-initials last-name]}
{Institution Affiliation [name of Author’s institute]}
Introduction
Computer hacking comes as a direct result of advances in technology like the internet and social networking. The hacking activities range between illegal and legal and is often debated for its ethical and unethical nature. Computer hackers are talented people fascinated by computers and technology and mostly start at college and school level. Moral values and ethics of the hackers differentiate between good and bad ones (Xu, Hu & Zhang, 2013). The three categories of hackers are Black Hats, White Hats and Gray Hats. The common notion of the three categories of hackers that separates them is their intent and authorization of their work.
Different Types of Hackers
White Hats
A White Hat hacker is the one who works with the authorities within the confines and boundaries of the law or also as a security expert. Most White Hats are ethical hackers that work to improve the security of the software and also towards the public awareness of the issue. White Hats are usually associated with the vendors of a particular software company and are bound by the terms and conditions by the company (Fitch, 2003).
Motivation
White Hats are motivated by their quest for knowledge and their intention to improve the software processes and systems. White Hats have an urge to protect the public from security holes in particular software. They are interested in enhancing the security of operating systems, networks and software processes, and applications. They work hand in hand mostly with an organization in order to improve and develop their systems security. White Hats are differentiated by their self-control, rational choice and deterrence from the path of crime (Fitch, 2003; Xu, Hu & Zhang, 2013).
Black Hats
Black Hats work individually and publish the security problems for existing software and operating systems. Black Hats take the path of crime and have no issues about destroying or stealing data on the networks that they infest. The common definition of a Black Hat hacker is that they violate or hacks system for personal and malicious gains. Black Hats hackers are equally talented with an affection of technology and computers, inherent curiosity towards exploration that is nurtured towards illicit excursion and criminal exploitation. The only thing differentiating a Black Hat and a White Hat is their values and judgment regarding their activity and behavior. Cyber terrorists are the extreme form of Black Hats (Fitch, 2003).
Motivation
They are driven by anger and hate, and mostly a quest for power. Black Hats go for sabotage, revenge or outright criminal activities for monitory and power gains such as to steal data, money or blackmail their victims. The primary motivation and intent of Black Hats is to harm their targets (Fitch, 2003; Xu, Hu & Zhang, 2013).
Gray Hats
Gray Hats are those hackers that do not belong to the group of corporate security testers and also they distance themselves from the notorious group of Black Hats. This group comprises of independent security experts, consultants, and corporate security researchers. Gray Hats are mostly evolved from Black Hats after changing their intent and getting rid of the desire to perform fraudulent activities. Gray Hats are considered sometimes ethical and sometimes non-ethical by different experts (Fitch, 2003; Xu, Hu & Zhang, 2013).
Motivation
Gray Hats hack for fun, curiosity, self-fulfillment or notoriety but they are differentiated by their motivation and intent which is not to harm their targets (Fitch, 2003; Xu, Hu & Zhang, 2013).
References
Fitch, C. (2003). Crime and Punishment: The Psychology of Hacking in the New Millennium.
Giac.org. Retrieved 11 June 2016, from https://www.giac.org/paper/gsec/3560
/crime-punishment-psychology-hacking-millennium/105795
Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer
hackers. Communications of the ACM, 56(4), 64-74.