Inside the Hacker Mind
Computer hackers follow a very specific methodology when it comes to attacking their targets; here are some insights into their process.
March 04, 2015 at 09:45 AM
7 minute read
The original version of this story was published on New Jersey Law Journal
The term “hacker” used to refer to an individual with an extraordinary talent for finding creative and clever means to address an issue in a programming language or to achieve some other mundane goal. Now it primarily means someone who circumvents computer and network security in order to gain unauthorized access and control of third-party systems and resources.
Just as a locksmith and a cat burglar use the same tools and often share a similar skill set, the cyber-security industry coined several terms in order to distinguish the good guys from the bad guys. Those terms are:
White hat hacker: IT security expert, ethical hacker and penetration tester.
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
Trending Stories
- 1The Law Firm Disrupted: For Big Law Names, Shorter is Sweeter
- 2Wine, Dine and Grind (Through the Weekend): Summer Associates Thirst For Experience in 'Real Matters'
- 3'That's Disappointing': Only 11% of MDL Appointments Went to Attorneys of Color in 2023
- 4What We Know About the Kentucky Judge Killed in His Chambers
- 5'I'm Staying Everything': Texas Bankruptcy Judge Halts Talc Trials Against J&J
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250