SlideShare a Scribd company logo
1 of 19
Download to read offline
HACKER
HACKER
Group Members
Index
• Abstract (1)
• Introduction (2)
• Problem Statement (3)
• Objective (4)
• Literature Review (5)
• Hacking (6)
• Hacker (7)
• Types of Hackers (8)
• Black Hat Hacker (9)
• White Hat Hacker (10)
• Black Hat Hacker vs White Hat
Hacker (11)
• Conclusion (12)
• References (13)
• Thank you (14)
• Any Question (15)
• Video Link (16)
Abstract
➢Cyberspace hacker or black hat hacker has led to new cyber
crimes such as exploitation of computer system vulnerabilities. In
an effort to mitigate this phenomenon, companies have hired
security professionals with similar skills as malicious hackers to
keep their information safe. So this presentation is an attempt to
discuss Black Hat andWhite Hat Hackers.
1
Introduction
➢Today the modern society reliance on the network technology which give
benefits of collaboration to organizations and individuals.
➢This change also lead us to the new cybercrime (Hacking).
➢To mitigate these issues or to make system secure company professional
hire ethical hacker also known as white hat hacker.
➢So in this presentation we will discuss about the role and positions of
white hat hacker and black hat hacker.
2
Problem Statement
➢Hacking is an exploitation of vulnerability and follows a series of
well-defined actions that make it a process (EC-Council, 2018).
➢White Hat and Black Hat hackers share an almost common hacking
process and skills. One hacker exploit system vulnerabilities to
damage the system or the another one is to resolve the problem.
➢So, it is essential to understand those ethical values are in relation to
back hats and white hat hackers.
3
Objectives
➢To know about hackers and ethical values
➢Role of hackers
➢Black hat and white hat hacker roles and positions
4
Literature Review
➢Company information has been compromised due to security
threats and hacking. With the recent rise of security breaches, many
companies have tried to mislead the hacking incident by hiring
security professionals with similar skills to hackers to ensure that
their infrastructure is safe and that they are ready for threats.
5
Hacking
➢The term hacking means Stole someone information.
➢Hacking or access someone information without there permission is
illegal and it is a crime.
➢To gain access on someone pc or there data by exploiting the
vulnerabilities is known as hacking (sharma, 2008).
6
Hacker
➢The term "hacker" was first used to refer to the best and radical
programmers in the field of computer science (Sharma, 2008).
➢Hack refers to "innovation, style and technical features“
(madarie,n.d).
➢Highly skilled person who can gain authorized or unautherized
access on some other computers or private data (Techterm, 2013).
7
Type of Hacker
8
BLACK HAT HACKER
WHITE HAT HACKER
GREY HAT HACKER
Black Hat Hacker
➢Also known as Cracker.
➢Involve in bad or illegal activities.
➢Do malicious work.
➢Exploit System vulnerabilities to harm other.
➢Trying to harm system and stole useful information.
9
White Hat Hacker
10
➢Also known as Ethical hacker.
➢Penetrate testing and help the organization to secure there system.
➢Follow legal and permission based procedure.
➢Exploit System vulnerabilities to help the organization.
➢Trying to secure system from security threats.
Black Hat Hacker vs White Hat Hacker
Black Hat White Hat
Known as Cracker. Known as Ethical hacker.
Do Illegal and malicious work. Do Legal work.
Damage system and stole data.
protect and help organization to
secure there data.
Exploit System to do malicious
work and own sole purpose.
Exploit System to help other and
protect from threats.
11
Conclusion
➢Hacking has both illegal and legal aspects. Unauthorized access and
use or personal information or computer resources are part of illegal
hacking. Where as legal or ethical aspect has legal limitations and
there is no charge to press. This is being morally and legally justified.
These are the common factor between Black Hat Hacker and White
Hat Hacker.
12
Citation and References
➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited.
➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological
Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446
➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of
MotivationalTypes of Values in a Sample of Hackers Under a Creative
Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC
BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International
Journal of Cyber Criminology, 11(1), 973–5089.
https://doi.org/10.5281/zenodo.495773
➢Link of Research paper =
https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat
_-_The_thin_line_of_ethicsedited
13
Thank you
14
Any Question?
15
Video Link
➢Google Drive
https://drive.google.com/file/d/1ITTWaw3qtn0R0h1hFah
J5dHegkOm-aZn/view?usp=sharing
16

More Related Content

What's hot (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Bug Bounty Secrets
Bug Bounty Secrets Bug Bounty Secrets
Bug Bounty Secrets
 

Similar to White hat and black hat hackers

Similar to White hat and black hat hackers (20)

Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
ethics final project
ethics final projectethics final project
ethics final project
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
ACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptxACTIVITY1 FCS.pptx
ACTIVITY1 FCS.pptx
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
hacking
hackinghacking
hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hackers
HackersHackers
Hackers
 

Recently uploaded

Jason Potel In Media Res Media Component
Jason Potel In Media Res Media ComponentJason Potel In Media Res Media Component
Jason Potel In Media Res Media ComponentInMediaRes1
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptx4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptxmary850239
 
Jordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media ComponentJordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media ComponentInMediaRes1
 
Farrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest EntranceFarrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest Entrancejulius27264
 
The Shop Floor Overview in the Odoo 17 ERP
The Shop Floor Overview in the Odoo 17 ERPThe Shop Floor Overview in the Odoo 17 ERP
The Shop Floor Overview in the Odoo 17 ERPCeline George
 
How to create _name_search function in odoo 17
How to create _name_search function in odoo 17How to create _name_search function in odoo 17
How to create _name_search function in odoo 17Celine George
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...DrVipulVKapoor
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
The Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian CongressThe Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian CongressMaria Paula Aroca
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Jason Potel In Media Res Media Component
Jason Potel In Media Res Media ComponentJason Potel In Media Res Media Component
Jason Potel In Media Res Media Component
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptx4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptx
 
Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
Jordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media ComponentJordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media Component
 
Farrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest EntranceFarrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest Entrance
 
The Shop Floor Overview in the Odoo 17 ERP
The Shop Floor Overview in the Odoo 17 ERPThe Shop Floor Overview in the Odoo 17 ERP
The Shop Floor Overview in the Odoo 17 ERP
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
How to create _name_search function in odoo 17
How to create _name_search function in odoo 17How to create _name_search function in odoo 17
How to create _name_search function in odoo 17
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
The Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian CongressThe Emergence of Legislative Behavior in the Colombian Congress
The Emergence of Legislative Behavior in the Colombian Congress
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 

White hat and black hat hackers

  • 3. Index • Abstract (1) • Introduction (2) • Problem Statement (3) • Objective (4) • Literature Review (5) • Hacking (6) • Hacker (7) • Types of Hackers (8) • Black Hat Hacker (9) • White Hat Hacker (10) • Black Hat Hacker vs White Hat Hacker (11) • Conclusion (12) • References (13) • Thank you (14) • Any Question (15) • Video Link (16)
  • 4. Abstract ➢Cyberspace hacker or black hat hacker has led to new cyber crimes such as exploitation of computer system vulnerabilities. In an effort to mitigate this phenomenon, companies have hired security professionals with similar skills as malicious hackers to keep their information safe. So this presentation is an attempt to discuss Black Hat andWhite Hat Hackers. 1
  • 5. Introduction ➢Today the modern society reliance on the network technology which give benefits of collaboration to organizations and individuals. ➢This change also lead us to the new cybercrime (Hacking). ➢To mitigate these issues or to make system secure company professional hire ethical hacker also known as white hat hacker. ➢So in this presentation we will discuss about the role and positions of white hat hacker and black hat hacker. 2
  • 6. Problem Statement ➢Hacking is an exploitation of vulnerability and follows a series of well-defined actions that make it a process (EC-Council, 2018). ➢White Hat and Black Hat hackers share an almost common hacking process and skills. One hacker exploit system vulnerabilities to damage the system or the another one is to resolve the problem. ➢So, it is essential to understand those ethical values are in relation to back hats and white hat hackers. 3
  • 7. Objectives ➢To know about hackers and ethical values ➢Role of hackers ➢Black hat and white hat hacker roles and positions 4
  • 8. Literature Review ➢Company information has been compromised due to security threats and hacking. With the recent rise of security breaches, many companies have tried to mislead the hacking incident by hiring security professionals with similar skills to hackers to ensure that their infrastructure is safe and that they are ready for threats. 5
  • 9. Hacking ➢The term hacking means Stole someone information. ➢Hacking or access someone information without there permission is illegal and it is a crime. ➢To gain access on someone pc or there data by exploiting the vulnerabilities is known as hacking (sharma, 2008). 6
  • 10. Hacker ➢The term "hacker" was first used to refer to the best and radical programmers in the field of computer science (Sharma, 2008). ➢Hack refers to "innovation, style and technical features“ (madarie,n.d). ➢Highly skilled person who can gain authorized or unautherized access on some other computers or private data (Techterm, 2013). 7
  • 11. Type of Hacker 8 BLACK HAT HACKER WHITE HAT HACKER GREY HAT HACKER
  • 12. Black Hat Hacker ➢Also known as Cracker. ➢Involve in bad or illegal activities. ➢Do malicious work. ➢Exploit System vulnerabilities to harm other. ➢Trying to harm system and stole useful information. 9
  • 13. White Hat Hacker 10 ➢Also known as Ethical hacker. ➢Penetrate testing and help the organization to secure there system. ➢Follow legal and permission based procedure. ➢Exploit System vulnerabilities to help the organization. ➢Trying to secure system from security threats.
  • 14. Black Hat Hacker vs White Hat Hacker Black Hat White Hat Known as Cracker. Known as Ethical hacker. Do Illegal and malicious work. Do Legal work. Damage system and stole data. protect and help organization to secure there data. Exploit System to do malicious work and own sole purpose. Exploit System to help other and protect from threats. 11
  • 15. Conclusion ➢Hacking has both illegal and legal aspects. Unauthorized access and use or personal information or computer resources are part of illegal hacking. Where as legal or ethical aspect has legal limitations and there is no charge to press. This is being morally and legally justified. These are the common factor between Black Hat Hacker and White Hat Hacker. 12
  • 16. Citation and References ➢Abeoussi, Jean. (2019). White Hat and Black Hat -The thin line of ethics.edited. ➢Sharma, R. (2008). Peeping into a Hacker’s Mind: Can Criminological Theories ExplainHacking? SSRN. https://doi.org/10.2139/ssrn.1000446 ➢Madarie, R. (n.d.). Madarie – Hackers’ Motivations:Testing Schwartz’sTheory of MotivationalTypes of Values in a Sample of Hackers Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License Hackers’Motivations:Testing Schwar. International Journal of Cyber Criminology, 11(1), 973–5089. https://doi.org/10.5281/zenodo.495773 ➢Link of Research paper = https://www.researchgate.net/publication/336242801_White_Hat_and_Black_Hat _-_The_thin_line_of_ethicsedited 13