Hacking 101; Monday; Period 2
Monday, July 28th, 2014 07:43 amThe class was back in the computer lab today and Riley was busily typing on his laptop while everyone filtered in. Once everyone was there and settled, he stood up.
"Good morning," he greeted. "Today, we're going to change gears slightly. We're not going to learn any hacking techniques but rather a few of the different types of hackers there are out there."
He passed out a worksheet of the different classifications before moving on.
"The hacker that I am, for the most part, is a white hat. I hack systems for various companies and corporations to make sure their security is strong. If I can get in, they know they have to tighten things up. Conversely, you then have the black hat hackers who hack systems for their own personal gain. These are the guys who get the notoriety for hacking banks and highly secure systems. A grey hat is the in between. They're the guys that break into a system but then go and tell the system admins that they did it and offer to fix the security hole for free. Maybe not the best way of doing things but helpful, at least."
He paused for a moment. "There are more but I just wanted to touch on the big three during the lecture. For today's activity, I'm going to give you a few scenarios and I want you to try and choose which type of hacker would be the one doing the hacking. Easy, yeah? Let's go."
"Good morning," he greeted. "Today, we're going to change gears slightly. We're not going to learn any hacking techniques but rather a few of the different types of hackers there are out there."
He passed out a worksheet of the different classifications before moving on.
"The hacker that I am, for the most part, is a white hat. I hack systems for various companies and corporations to make sure their security is strong. If I can get in, they know they have to tighten things up. Conversely, you then have the black hat hackers who hack systems for their own personal gain. These are the guys who get the notoriety for hacking banks and highly secure systems. A grey hat is the in between. They're the guys that break into a system but then go and tell the system admins that they did it and offer to fix the security hole for free. Maybe not the best way of doing things but helpful, at least."
He paused for a moment. "There are more but I just wanted to touch on the big three during the lecture. For today's activity, I'm going to give you a few scenarios and I want you to try and choose which type of hacker would be the one doing the hacking. Easy, yeah? Let's go."