Menu

External Threats - Categories

Drag answers into the correct category. Once all of the answers have been categorised press submit to check your answers.

Black Hat
White Hat
Grey Hat

Answers
Hackers may identify and report vulnerabilities but without malicious intent
This type of hacking is legal and often employed by companies for security assessments
These hackers operate without permission and often break laws
Grey hat hacking can be for fun, challenge, or to draw attention to security flaws
Refers to unauthorised hacking by individuals seeking to exploit system vulnerabilities
Often associated with malicious intent like data theft, system damage, or financial gain
Their goal is to help organisations fortify their defenses against potential attacks
Grey hat hacking falls between black hat and white hat, involving unauthorised testing
White hat hackers are authorised to test systems and identify vulnerabilities
They do not have explicit permission to access the systems they test
Black hat hackers may deploy malware, launch denial of service attacks, or engage in phishing
Involves ethical hacking conducted by professionals to improve system security
Log in or sign-up to access the categorising activity



Don't have a login?

You can still revise this topic