Note that your final mark will not be saved in the system.
B2 Prevention and management of threats to data GapFill
You must fill all the gaps before clicking ‘Check Answers!’
In the previous topic, you learned that black hat hackers try to gain access for criminal activities such as to steal money and intellectual property. However, there are two other types of hacker that don’t have such criminal intent.
A hat hacker is a professional security expert. They are paid by companies to deliberately hack into their system in order to . After his process has occurred, the hackers disclose the vulnerabilities to the company so that the vulnerabilities can be . But employing experts can be .
One way of checking a computer system for weaknesses is a penetration test – this is often called a test. These tests take place in order to minimise disruption. These tests might look for weaknesses such as . Afterwards a outlining the issues found and containing recommendations will be given to the organisation so that the vulnerabilities that have been discovered can be fixed.
The other type of hacker is a hat. They are hackers who have not requested permission to try to hack into the system. Because of this their actions are technically and they could be prosecuted by the company. These hackers will usually inform the company of the weakness, may offer solutions or offer to fix it themselves, or threaten to publicly disclose the weakness if it’s not been fixed within a specified time frame.
Companies also their networks for unusual activity - such as employee access, web pages visited, or sudden increases in network activity which could mean that a computer is infected by a worm or is sending out spam.