answersLogoWhite

0

Not all, some are good some are bad. White hat hackers are good, and black hat hackers are bad.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Do hackers represent an internal human threat?

No. Hackers are generally regarded as external human threats. Internal human threats include disgruntled employees. They may also be hackers, but the fact they are employees makes them an internal threat, not the fact they are hackers.


Who is ranked the greatest threat to a computer system?

hackers


Are hackers considered an environmental threat?

No, Just a online threat.


What is the biggest threat to computer security?

Hackers


What are different types of hackers?

Black Hat: Criminal Hackers White Hat: Authorized Hackers Grey Hat: “Just for Fun” Hackers Script Kiddies: Ametuer Hackers Green Hat: Hackers-in-Training Blue Hat: Authorized Software Hackers Red Hat: Government-Hired Hackers State/Nation Sponsored Hackers: International Threat Prevention


Both internal and external human threats can bring down a system Which of the following represents an internal human threat?

Disgruntled employees.


Is hacking illegal if given permission to do so?

Hackers with concent are called ethical hackers and they are encharged with keeping the virus threat up to a minimal level.


What is considered an environmental threat a fire b firewall c spies d hackers?

That would depend on the environment, but fire is the common environmental threat. Hackers also threaten the environment of computers. Spies also threaten business and government environments. Firewalls are not a threat of any kind.


Which is the best operating system for hackers?

The best OS for hackers is Backtrack Linux 5.


What are the Different Types of Hackers?

Oh, dude, we've got your script kiddies who just copy and paste code, your black hat hackers causing chaos, your white hat heroes fixing stuff, and your grey hats who are like the rebellious teens of the hacking world. It's like a high school cafeteria, but with more computer screens and less actual food.


What hackers do after hacking?

It depends on... Usually after hacking the system, hackers escalate rights on the system, then open backdoors (by installing "illegal" software) to make possible to use the system again. And the last step hackers hide its presence by deleting or modifying log files.


Internal and external threats to ict systems?

internal threats are anything that harms the computer system within the organisation such as hardware failure, human error. External threats are anything that harms the system from outside the organisation, such as, viruses, hackers, spyware