Welcome, in this video, we're going to talk about, the world of hacking. A really exciting topic, hot topic, with cyber security, and data science overall. Is all hacking bad? No, actually some hacking is good, we'll explain that. There are different types of hackers, white hackers, gray hackers, and black hackers. We are going to talk about that in this video. I'm going to go over, the related assignment with, a website, that is really cool, called, ThingLink, that allows you to create, hotspots, to put in information, so that you can, have this interactive image, and put it out there on the web for all to see. We're going to get into hacking in general. Like many of these other topics, a lot of this crossover would really, get into a social engineering assignment than a human aspect of it, and talk about some of the methods that, are used to, have cyber-security breach, or data breach of some Kind. Hacking in general, started way back. Is if you've ever heard of the maker movement, where people are creating things, and trying things, and imagining, and creating new ways of doing things. Hacking, in its beginning stages, was in, that realm. It shifted, with the advent of, more complex computing systems, and, cybersecurity, as a field in general. Hackers in the news, you'll see, generally, not perceived as, good. But you'll see as we go through some of these resources that, even though there are, these, so-called black hackers, I remember it's a color of hats, white hat, great hat and black hat. The folks that, they label as the black hat hackers. They are basically, those that, are doing things for, bad. Let's go back. Let's start with, a white hacker. What's a white hacker? A white hacker, is actually a hacker that, you have an organization, a big organization, and you want to be able to understand, what the vulnerabilities are. From a cybersecurity perspective, how safe are you? How do you do that? Well, you actually go out, and you find, either, internally you find, or you go out and find, someone who has the ability, and the know-how, to be able to try and hack, into your system, access your data, access your systems, things that you don't want people, to access. We go back to that availability, in CIA. You don't want everything available. You want to make sure no one, with the integrity is messing with your data. You want to make sure that everything remains confidential. Well, how do you do that? One way to do it, is to hire, a professional, white hat hacker, that, has the ability and the skill set to actually, try to break into your system, in a controlled environment. By I mean, by controlled environment, is, they are working with people, inside the organization, on contract, or, they're employees of the organization, and they're trying to break into the system, so that, the system can get more secure. You'll see that even with the black hat hackers. It's actually a functionality of, when something gets hacked, we get better. We talked about this, with the, cryptography and the encryption as well, where, things became more and more complex, because it was easier to figure out, passwords, so that we needed more and more complex encryption, processes around the data, and around cybersecurity in general. Well, it's the same thing, with hackers. White hat hackers who, will, be paid, to find vulnerabilities to do things like pen testing, penetration testing. They're actually trying to get into the systems. They do, often get into the systems, because this is what they do, and what happens, the organization adjusts, based on how, difficult, or easy it is to get into systems. They'll adjust what they do. They'll put different layers of protection in. They'll, add more complexity to, their cybersecurity. Whatever they need to do, to amend, so that they are not vulnerable, to, the hackers. That's what the white hackers do. Then you have gray hacker. While white hat hackers, are the ones, that have full permission, they're usually being hired by organizations, to get into their system, to show vulnerabilities, yet the gray hat hackers that, are not quite, it's muddy waters. The gray hat hackers, really are about, doing things, without permission, but not, technically illegal. An example, that is a few years, back. Someone hacked the iPhones and actually sold information to the FBI about an incident that happened to national security. This is a case that, they did it without permission but it ended up being good. You see these, what are called hacktivists, and you'll read about some of those in some of the documentation. They're doing things for good and they're depending on themselves to draw that ethical line or that moral line. You'll see in some of the literature that you're reading, and some what you're finding, you'll see ethical versus unethical hacking. The gray hat hackers are in that space where they're doing things or hacking, but they're not necessarily getting permission. In some instances, it could lead to them getting in trouble, and it's found that it's against the law, for example. But in other instances it doesn't hurt anybody. It's up to the person in that space to decide whether it's ethical or not ethical, and often legal or illegal too, and that's a gray area like the name says, gray hat hackers. Then you have black hat hackers. Black hat hackers are those that are out there for no good, they want to steal your money, they want to get the data and sell the data to someone, or they just want to do damage. Sometimes it's not about the money, it's just about really messing with an organization and bringing an organization down just for the sake of bringing it down, doing damage just for the sake of doing damage. Ninety nine percent of the time those are illegal activities that the black hat hackers are doing. Just be aware, but even them. All of these areas, the white hat hackers, the gray hat hackers, and the black hat hackers, they all have this functionality to improve cybersecurity, data security overall, because what's happening even with the bad guys, the bad people that are doing this, they essentially are upping the ante. We talked in an earlier video about the ebb and the flow, I think it was in the encryption, where something comes out, somebody decrypts whatever it is, and then they find a better way to encrypt the data. Well, it's the same thing with hacking. You have these hackers to get out there, get into systems, get the information. What happens, the people that are trying to protect the information from a cybersecurity perspective, they have to evolve and adjust, and they do that through the white hat hackers, the gray hat hackers, but also the black hat hackers. They all have this functionality too. What does that do? Once they adjust to what the black hat hackers are doing, it makes them safer moving forward. In a weird way, even black hat hackers are helping to keep us more secure at someone else's expense, which is a bad thing. White hat hackers, at least it's not at someone's expense. Gray hat hackers sometimes we don't know. Everything contributes to a more secure system overall. But it is always going to be this back and forth once the folks adjust to protect their data and make sure they're more secure with cyber, then the hackers are going to figure out a different way of getting into things and doing things. You'll notice again, we talked about quantum computing and the speed of which people can guess passwords or access systems or whatever it might be. That's just exponentially increasing too. It's just becoming a challenge on both sides for hackers to hack, but also for the people to stay on top of this. You're always going to have this ebb and flow, one being ahead, then the other being ahead, and then the other one coming on top of that. Just keep that in mind and that's going to just about wrap up this video. Remember, it's really exciting space and it's really intriguing. There's a lot of psychology, human aspects to it. We'll get into the social engineering again, but you'll see this human aspect theme come in. We're talking about ethical versus unethical. You'll see this theme come in throughout what we're talking about with cybersecurity. It's time and time again, you see this theme, the human, the social engineering, it's in everything that we do, hacking, ethical or unethical, there's always a psychological aspect of it. The study of what people are doing on the good side, the study of what people are doing on the bad side, the study of hacking as a positive to make you more secure. The study of what the hackers were doing to get into the systems. All this is really very complex and it's a really cool way for you to dig into it, starting with this assignment. See you for the next video, and good luck.