Topics: Black hat, Hacker, White hat Pages: 1 (377 words) Published: February 24, 2014
White Hat Hackers- These are Hackers that try to break into systems in order to help a company/corporation find the weaknesses in their system. They have no malicious intent and they are used to deter black hat hackers.

Black Hat Hackers- Hackers with malicious intent that try to hack into corporation websites, people’s personal info, and whatever other helpful info they can get ahold of that will benefit them financially. Gray Hat Hackers- These are hackers that do it just for the sport of it. They typically don’t have any malicious intent behind their hacking but only want to see if they can do it as a challenge.

For the past 9 years I have been working in the pharmaceutical manufacturing field producing drugs in a GMP environment. Currently, I work for a company that produces cancer drugs. The majority of my work duties are performed in a sterile environment under a class 100 hood. Over the course of my work experience in the pharmaceutical field I have been exposed to various high grade equipment, job duties, procedures, and validation teams that would make me a perfect candidate for your opening.

As you can see from my resume, I have an extensive background in the manufacturing field. I would love the challenge of breaking into the bio manufacturing field because I know that it has a very strong future and is very important to the development of our society. With the experience I have gained over the years I am confident I could perform at consistently high levels for your company.

Jonathan James was the first black hat hacker juvenile at the age of 16 to be sentenced to serve time in a juvenile detention center. He broke successfully hacked into NASA and the Department of Defense and had access to highly confidential information. While he didn’t steal anything he did cause tens of thousands of dollars in damage repairing systems. After his release he was later tied to a ring of hackers that were involved in a credit card scam that stole...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Dangers/Usefulness of Hackers in Today’s Society Essay
  • Essay on Anonymous hackers
  • Hacking and Hacker Essay
  • Ethical and Unethical Hackers Essay
  • Write an Essay Discussing the Pros and Cons of Hiring Known Hackers to Test the Security of a System.
  • Should You Hire an Experienced Hacker to Protect Your It Systems Essay
  • Essay on Hackers
  • Computer Hackers Essay

Become a StudyMode Member

Sign Up - It's Free