White Hats Versus Black Hats

The world of security experts is divided into black hats, often referred to as hackers or crackers, and white hats, or your information security officer (ISO) or chief security officer (CSO). Both sides are interested in finding the latest security vulnerability in either a device or application. However, black hats typically use this information for personal gain, while white hats use the information for protection of the device or application from the other. The black hats are interested in these vulnerabilities because they can use them to gain unauthorized access to devices. With that access, they can appropriate proprietary information or deface a corporate website. White hats, however, are interested in finding ...

Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.