answersLogoWhite

0

Not all, some are good some are bad. White hat hackers are good, and black hat hackers are bad.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Do hackers represent an internal human threat?

No. Hackers are generally regarded as external human threats. Internal human threats include disgruntled employees. They may also be hackers, but the fact they are employees makes them an internal threat, not the fact they are hackers.


Who is ranked the greatest threat to a computer system?

hackers


Are hackers considered an environmental threat?

No, Just a online threat.


What is the biggest threat to computer security?

Hackers


What are different types of hackers?

Black Hat: Criminal Hackers White Hat: Authorized Hackers Grey Hat: “Just for Fun” Hackers Script Kiddies: Ametuer Hackers Green Hat: Hackers-in-Training Blue Hat: Authorized Software Hackers Red Hat: Government-Hired Hackers State/Nation Sponsored Hackers: International Threat Prevention


Is hacking illegal if given permission to do so?

Hackers with concent are called ethical hackers and they are encharged with keeping the virus threat up to a minimal level.


What is considered an environmental threat a fire b firewall c spies d hackers?

That would depend on the environment, but fire is the common environmental threat. Hackers also threaten the environment of computers. Spies also threaten business and government environments. Firewalls are not a threat of any kind.


Both internal and external human threats can bring down a system Which of the following represents an internal human threat?

Disgruntled employees.


Both internal and external human threats can bring down a system Which represents an internal human threat?

An internal human threat refers to a risk posed by individuals within an organization, such as employees or contractors, who may intentionally or unintentionally compromise security. This can include actions like data theft, sabotage, or negligence in following security protocols. For example, an employee mishandling sensitive information or deliberately leaking proprietary data represents an internal threat to the system's security.


Which is the best operating system for hackers?

The best OS for hackers is Backtrack Linux 5.


What are the Different Types of Hackers?

Oh, dude, we've got your script kiddies who just copy and paste code, your black hat hackers causing chaos, your white hat heroes fixing stuff, and your grey hats who are like the rebellious teens of the hacking world. It's like a high school cafeteria, but with more computer screens and less actual food.


What hackers do after hacking?

It depends on... Usually after hacking the system, hackers escalate rights on the system, then open backdoors (by installing "illegal" software) to make possible to use the system again. And the last step hackers hide its presence by deleting or modifying log files.