White Hat / Black Hat

“When speaking in cyber security terms, the differences in hacker “hats” refers to the intention of the hacker. For example:
-White hat: Breaches the network to gain sensitive information with the owner’s consent – making it completely legal. This method is usually employed to test infrastructure vulnerabilities.
-Black hat: Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal. ”

Technology Elevated