External Threats - Categories

Drag answers into the correct category. Once all of the answers have been categorised press submit to check your answers.

Black Hat
White Hat
Grey Hat

Answers
Their goal is to help organisations fortify their defenses against potential attacks
White hat hackers are authorised to test systems and identify vulnerabilities
Hackers may identify and report vulnerabilities but without malicious intent
These hackers operate without permission and often break laws
This type of hacking is legal and often employed by companies for security assessments
Refers to unauthorised hacking by individuals seeking to exploit system vulnerabilities
They do not have explicit permission to access the systems they test
Grey hat hacking can be for fun, challenge, or to draw attention to security flaws
Often associated with malicious intent like data theft, system damage, or financial gain
Black hat hackers may deploy malware, launch denial of service attacks, or engage in phishing
Involves ethical hacking conducted by professionals to improve system security
Grey hat hacking falls between black hat and white hat, involving unauthorised testing
Log in or sign-up to access the categorising activity



Don't have a login?

You can still revise this topic