Internet and computers (to be generic all the devices in general)have changed we store the information from record books and huge ledger files preventing it from being stolen, lost, or tampered physically, but these digital data have opened a way to be stolen or tampered more easily nowadays with the advent of some dark villains (or that’s what they are stereotyped to be) HACKERS.
Hackers
Some shady teen sitting in the dark corner of the room tapping in a device made out of junk or some cool person with stylish attire commanding computers with a blink of an eye Compromising a top-secret bank -if that is what you think sorry you are too much into movies gigs But that’s not how real life works In a real word.
Hackers are technically anyone with help of knowledge and skill with the support of some device (or in some cases no device as in social engineering ) solves an issue.
It takes a lot of patience training and continuous self-learning to become one.
Any person from tech enthusiastic to a shady criminal hacker everyone can be ranked up based on their expertise and motive.
So if we are going to fictionally use the sorting hat of the harry potter movie to find the motive of these hackers and classify them into 10 groups (with).
Black hat
They are shady characters whose main aim is to maliciously search vulnerabilities and exploit them for personal gains the main target of these stereotypical hackers would be to gain data or money in exchange for data.
White hat
They are almost similar to black hat hackers and in expertise, the only difference is that they are given permission and in some cases, they are hired to find vulnerabilities correcting them.
Grey hat
They are the combination black hat and white hat their target would be to find vulnerabilities but the method would be illegal ones and they might also give the vulnerabilities to the public.
Scribe kiddies
They can be perfectly explained as less experienced malicious hackers and they would depend upon the software and scripts that are already existing and to some extent modify them and use them for their own needs.
Green hat
So these are almost like our scribe kiddies because of their motive which is to learn hacking to become a white one rather than using the skills for malicious works.
Blue hat
These groups are also similar to scribe kiddies except for the fact their motive is revenge. may it be a small high school teen frustrated over his professor or any serious one(the level or revenge might vary ) all fall into this category.
Red hat
They are again similar to white hat hackers the key difference is that attacking and prevent black hat hackers directly (not the malware created by black haters) and take them down.
State hacker/ National hacker
Some hackers are hired by the government from either state or national side to infiltrate into the confidential data to keep a check on any possible thread or impending attack.
Hacktivist
This group is also almost connected to the government or to be more precise it is almost against the government they pose themself as an activist and they also infiltrate into any government website and gain confidential data and thus sell it for monetization gain or for personal gains sometimes even to the public to tarnish the image of the government.
Whistleblower
This group of hackers works as a part of an organization to expose confidential information due to their grudge (you can relate this to blue hat hackers except for the part the revenge motive is not personal but more professional).
“You have to decide who you are and force the world to deal with you, not with its idea of you.”— James Baldwin
So in which category do you think you are sorted to if our fictitious sorting hat is kept on your head?
Tell us in the comment section and stay tuned for more Infotainment content.