Hackers in the field of computer security are concerned with security mechanisms and their weaknesses. While the term also includes those who are looking for vulnerabilities in order to identify or correct, it is used by the mass media and the general public more commonly for people who illegally exploit such gaps. Similarly, the concept is strongly positive or negative.
Depending on the motivation and loyalty to the law, a distinction is made between white-hat, gray -hat and black-hat hackers, in particular black hats are also known as crackers. After a group of young hackers, known as The 414s, broke into numerous computer systems of a United States politician. People called for an investigation and new laws against hacking.
Following the introduction of legislation on cybercrime there terms white-hat, gray-hat and black-hat hackers to distinguish them from each other, depending on the legality of their activities.
Anti Virus Support
White-hat: Use their knowledge both within the law and within the hacker ethic, for example, by performing professional penetration tests. Black-hat: Acting with criminal intent, for example, damage to the target system or steal data.
Grey-hat: May violate any laws or restrictive interpretations of the hacker ethic , but to achieve a higher goal. For example, by the publication of vulnerabilities to make a denial and impossible to force those responsible to fix them. Grey hats are distinguished in that they are not clearly marked as good or evil to be classified.
These systems are found today in very different organizations: enterprises, utilities, international institutions, central and local governments, study centers and universities, colleges, chambers of commerce and industry.
With the collective intelligence and Anti Virus Support, there is the risk of loss of skills in business, that is, if the uses of information is not well defined with respect to context, and if the communication is poorly controlled .
There are several information security aspects, which are also related to the data: confidentiality, integrity and availability. The ISO 13335 standard also mentions the non-repudiation, proof management (accountability), and authentication.
Authentication is one of the three phases of access control, which is the area of privacy and there is also a notion of authenticity that is not directly related to access control.
Understanding security aspects of data centers
The physical environment of the centers is under strict surveillance: monitoring the proper functioning of air conditioning, itself essential to the proper functioning of electronic equipment. Emergency power can be supplied via a UPS and a generator or via a (no-break ) rotating group coupled to a kinetic battery. The centers typically have a raised floor of 60 cm, made of removable tiles.