1 00:00:00,390 --> 00:00:07,080 And types of pockets now we have three types, actually the Black Hat hackers, the White Hat and the 2 00:00:07,080 --> 00:00:07,350 gray. 3 00:00:07,620 --> 00:00:09,450 Now let's start with the Black Hat hackers. 4 00:00:10,200 --> 00:00:15,660 Now, the Black Hat hacker is individual who attempts to gain an unauthorized entry into a system or 5 00:00:15,660 --> 00:00:17,850 network to exploit them for malicious reasons. 6 00:00:18,270 --> 00:00:24,810 Now, the Black Hat hacker doesn't have any permission or authority to compromise their target, and 7 00:00:24,810 --> 00:00:30,810 they try to inflict damage by compromising security systems, setting functions of websites and networks, 8 00:00:31,050 --> 00:00:32,530 or shutting down systems. 9 00:00:32,549 --> 00:00:32,970 OK. 10 00:00:33,210 --> 00:00:39,540 And they often do so to steal or gain access to a backwards financial information and other personal 11 00:00:39,540 --> 00:00:39,870 data. 12 00:00:41,040 --> 00:00:49,110 No, the white hat hackers, on the other hand, is or are missing are deemed to be the good guy working 13 00:00:49,110 --> 00:00:54,900 with organization to strengthen the security of our system, and our white hat has a better mission 14 00:00:54,900 --> 00:01:00,810 to engage their targets and to compromise them within that prescribed rules of engagement. 15 00:01:01,020 --> 00:01:07,360 And a white hat hackers are often referred to as ethical has know the difference between White Hat and 16 00:01:07,360 --> 00:01:08,250 the Black Hat. 17 00:01:08,550 --> 00:01:16,130 The White Hat has better mission and it is to strengthen the security of system for specific organizations. 18 00:01:16,790 --> 00:01:24,060 Now, on the other hand, the Black Hat hacker actually to damage the system and to steal or do bad 19 00:01:24,060 --> 00:01:24,400 stuff. 20 00:01:24,420 --> 00:01:28,900 OK, so a white hat doesn't mean that he's not skilled or it doesn't. 21 00:01:28,920 --> 00:01:31,910 He doesn't have the skills or the white. 22 00:01:32,010 --> 00:01:36,530 The Black Hat means he is smarter or he do things better. 23 00:01:36,570 --> 00:01:42,270 No, actually, the White Hat and Black Hat does interfere to that skills he have. 24 00:01:42,660 --> 00:01:45,360 No, actually, it refers to the intention. 25 00:01:45,570 --> 00:01:49,560 So a white hat, good intention, Black Hat, that intention. 26 00:01:49,560 --> 00:01:50,030 And so. 27 00:01:51,090 --> 00:01:53,160 Now we have the Grey Hat hackers. 28 00:01:53,660 --> 00:02:01,800 No, actually, these exploits networks and computer systems in a way that black hats do, but do so 29 00:02:01,800 --> 00:02:03,630 without any malicious intent. 30 00:02:03,960 --> 00:02:10,919 So it is closing all loopholes and vulnerabilities to no enforcement agencies or intelligence agencies. 31 00:02:11,190 --> 00:02:17,460 And it's really great hat hackers served in it and hack into computer systems to native to notify the 32 00:02:17,460 --> 00:02:24,120 administrator or the owner that their system contains one or more funding and abilities that must be 33 00:02:24,120 --> 00:02:25,020 fixed immediately. 34 00:02:25,140 --> 00:02:30,600 OK, so the intention here is good, but they didn't have better machines, so that's why we called 35 00:02:30,600 --> 00:02:33,150 them or they call them hat hackers.