Preview

hackers

Satisfactory Essays
Open Document
Open Document
377 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
hackers
White Hat Hackers- These are Hackers that try to break into systems in order to help a company/corporation find the weaknesses in their system. They have no malicious intent and they are used to deter black hat hackers.

Black Hat Hackers- Hackers with malicious intent that try to hack into corporation websites, people’s personal info, and whatever other helpful info they can get ahold of that will benefit them financially.
Gray Hat Hackers- These are hackers that do it just for the sport of it. They typically don’t have any malicious intent behind their hacking but only want to see if they can do it as a challenge.

For the past 9 years I have been working in the pharmaceutical manufacturing field producing drugs in a GMP environment. Currently, I work for a company that produces cancer drugs. The majority of my work duties are performed in a sterile environment under a class 100 hood. Over the course of my work experience in the pharmaceutical field I have been exposed to various high grade equipment, job duties, procedures, and validation teams that would make me a perfect candidate for your opening.

As you can see from my resume, I have an extensive background in the manufacturing field. I would love the challenge of breaking into the bio manufacturing field because I know that it has a very strong future and is very important to the development of our society. With the experience I have gained over the years I am confident I could perform at consistently high levels for your company.

Jonathan James was the first black hat hacker juvenile at the age of 16 to be sentenced to serve time in a juvenile detention center. He broke successfully hacked into NASA and the Department of Defense and had access to highly confidential information. While he didn’t steal anything he did cause tens of thousands of dollars in damage repairing systems. After his release he was later tied to a ring of hackers that were involved in a credit card scam that stole

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. Vulnerability scans performed from external hosted servers give the same perspective as an attacker. Two types of hacking are White hats which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. Black Hats are individuals that break into systems or networks that are not authorized to.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hat colors are often attributed to depict the mentality of a hacker or a cracker. Black hat corresponds to a harmful system intruder. White hat corresponds to a helpful security practitioner. Gray hat corresponds to a hacker who may act in goodwill, but also crosses the line to commit illegal acts.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Study Guide

    • 790 Words
    • 4 Pages

    9. Which type of attacker intends to be helpful? White-hat hackers - Ethical hacking...Intending to be helpful.…

    • 790 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    White hat hackers; these represent law cyber-crime police officers with the responsibility of eliminating or minimizing the activities of said Black Hat Hackers.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The black market is run by an assortment of hackers. There is no “typical hacker” and the reason why it is so hard to stereotype them or identify them.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus. Hacking groups begin to form. Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany. The movie "War Games" introduces the public to hacking. A computer hacker intends to ruin businesses performing an act much more unprincipled than an enthusiastic biologist 'hacking' away at work or theory. The truth is that computer hacking is in fact easy in the general sense, but more consideration must be given. Some aspects of hacking are used in everyday life and you may not know that accessing wireless internet from another person's account is considered wireless hacking even though your borrowing there connection. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Cover Letter

    • 1197 Words
    • 5 Pages

    I am a good team player who enjoy working with people and have had to work alone when the need arises using own initiative. I am able to stay calm in difficult situations and have the ability to work well under pressure. If considered for the above vacancy, I would relish the challenge of working for such a high profile company such as yours.…

    • 1197 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hackers who access a business or non-business organizations’ networks find files that contain personal data of employees or volunteers, proprietary and/or trade secrets, and financial data that allows for theft, fraud, and extortion. One such exploit involved the student “ Daniel Beckwit,…

    • 819 Words
    • 4 Pages
    Good Essays