<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=3018339815089949&amp;ev=PageView&amp;noscript=1">
What Is a Hacker? Blog Feature
Accent Computer Solutions

By: Accent Computer Solutions on May 10th, 2017

Print/Save as PDF

What Is a Hacker?

Cyber Security

There’s is a fine line between having heard of hackers and knowing what a hacker really does. You’ve heard the term and kind of, sort of, possibly understand what they do. But you wouldn’t be comfortable explaining what a hacker is to a room full of people, am I right?

Guess what? A majority of computer users don’t truly know what a hacker is either. Most people use the term to describe someone with malicious intent, but as the Internet evolves, so does the definition of “hacker.” That’s why putting your finger on the meaning is a bit complicated. What’s even more confusing is that the same title can be applied to both criminal and non-criminal activities.

That’s about as clear as mud, isn’t it?

Let’s get to the bottom of what hackers are and what they do.

What Is a Hacker?

Oddly enough, a hacker used to be someone who made furniture with an axe. There are a lot of theories about how the term became synonymous with computers, including the urge to smash your computer with an axe when it isn’t working, but the origins can’t be verified.

What we do know is what “hacker” means in the computer world today. According to the Merriam-Webster Dictionary:

  • An expert at programming and solving problems with a computer
  • A person who illegally gains access to and sometimes tampers with information in a computer system [for personal or financial gain]

Now, this is where things get muddy. If a hacker is just a great computer programmer, why do they break into corporations like Target and steal sensitive information?

Unfortunately, most hacker news is the negative type, especially during high retail seasons. There are always stories about retail corporations being hacked, leaving thousands of credit cards compromised. So the image of a villain in a dark room with a hoodie has some truth to it.

But that’s only one side of the story.

A Tale of Two Hacking Styles

To quote Facebook founder Mark Zuckerberg, “the word ‘hacker’ has an unfairly negative connotation from being portrayed in the media as people who break into computers. In reality, hacking just means building something quickly or testing the boundaries of what can be done.”

To simplify, let’s assume that a hacker is a computer wiz who is great at programming and solving issues, better, faster, and easier than all the computer savvy people you know. Now, just like with anything, with great power comes great responsibility. Hackers can choose their path.

Criminal Hacker or Crackers

Criminal hackers, or crackers, are what most people think of when discussing hackers. Their whole goal is to get through network security, access information stores to gather information, and then use that information for financial gain. The information can be used to steal through methods like corporate espionage, extortion, and blackmail. It can also be sold to the highest bidder on the Dark Web or Deep Web. These are the bad guys. They create malware and spyware to break into the system and steal everything for personal gain.

Related: You don’t have to be an IT expert to understand the risks of cyber crime. Get the Executive Guide to Cyber Security: Essential Information for Managing Business Risk

White Hat Hackers or Ethical Hackers

White Hat Hackers practice ethical hacking, which is like a brotherhood/sisterhood that comes with a code. And while some people argue that hacking is wrong no matter how you use it, this system keeps them honest and extremely helpful when it comes to protecting us.

Here is a sample code from Computer Hope:

  1. Expressed (often written) permission to probe the network and attempt to identify potential security risks.
  2. You respect the individual’s or company’s privacy.
  3. You close out your work, not leaving anything open for you or someone else to exploit at a later time.
  4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.

This is actually a career path.

Many ethical hackers work with government agencies, the military, law enforcement, and large corporations to safeguard networks from bugs, loopholes, and other vulnerabilities. These ethical hackers develop ways to block cyber attacks and make the world around us safer.

This brings us full circle. Cut yourself some slack if you couldn’t quite describe what a hacker was. The definition of “hacking” or “hackers” is far from black-and-white. But the takeaway should be this: a hacker can be good or bad. The bad ones might make the news more often, but the good ones are out there fighting to keep us protected.

 

About Accent Computer Solutions

Accent Computer Solutions, Inc. is a managed IT services, cyber security, and IT support provider, serving businesses with 30-500 employees throughout Southern California. The company is headquartered in Rancho Cucamonga, California, with IT professionals strategically located throughout San Bernardino, Riverside, Los Angeles, and Orange Counties, as well as Arizona and Texas.

  • Connect with Accent Computer Solutions