What is a 'White Hat'

A white hat is an ethical, noncriminal practice used to improve computer and internet security and search engine optimization. White hat hackers are a valuable resource for organizations who want to identify their security weaknesses in an attempt to prevent criminal attacks.

BREAKING DOWN 'White Hat'

White hats can be dubbed the "good guys" of hacking. They can research and find any lapses of security in software and then notify the owner of the system to fix it. Companies can gain a false sense of security after employing white hat hackers to identify security vulnerabilities. Since companies can change their systems and hackers can develop new techniques, the security threat is ongoing; and penetration testing should be ongoing as well. For example, white hats can identify a vulnerability that could cause invalid death certificates to be issued, which criminals could take advantage of to claim fraudulent life insurance payouts, or a vulnerability that could allow a power grid to be shut off remotely.

Famous white-hat hackers include Tim Berners-Lee (inventor of the World Wide Web), Apple co-founder Steve Wozniak, and Jeff Moss (founder of the annual hacker conference Defcon).

White Hats, Gray Hats, Black Hats

There are three different types of hackers out there. White hats, gray hats and black hats. Black hats are the criminals of the group. They will scour for holes or backdoors in order to gain access to systems and use malicious software to steal data. They will typically sell this information to other black hats as well. Gray hats fall into the middle of the group, but instead of selling the information they access to a malevolent party, they will sell it to governments and other agencies, who, in turn, will use that for the good of the public. Some of these hackers can be contracted or they may act as their own independent agents.

Consider the case of the FBI, who took Apple to court over the iPhone of one of the San Bernardino shooters. The agency requested Apple unlock the iPhone in order to gain access to the shooter's personal information. Apple refused, citing privacy issues, and the case was then taken to court. The FBI later withdrew its case, saying a third party managed to unlock the phone. Although the FBI never confirmed who gained access to the iPhone, it is likely that it was a gray hat hacker. 

White hat practices can be contrasted with black hat practices, which use unethical and even criminal methods for activities such as breaking into computer systems to steal information or cause damage, and misleading search engines into thinking a webpage’s content is more valuable than it is in order to increase traffic and generate ad revenue. Because cyber attacks from black hat hackers are such a significant threat, white hat hackers are a major asset to businesses, governments and the individuals those organizations serve, helping to protect profits, tax dollars, and reputations. White hat hackers even help technology companies, which could be surprisingly vulnerable, to protect their systems.

The catch-22 of teaching white hat practices to more individuals in an attempt to better protect computer-based systems is that penetration testing by white-hat hackers to look for weaknesses in a company’s software systems uses the same skills as criminal efforts to attack software systems.

White Hat Strategies

In terms of search engine optimization (SEO) practices, white hat strategies are those that completely follow the search engine’s rules. Websites that use these practices are less likely to be negatively affected by search engine algorithm updates, which are often aimed at making sure sites that use black hat practices don’t rise to the top of the search results. A gray hat strategy employs both white and black techniques to take some risk of increasing search engine traffic at the expense of bending the rules and potentially getting caught and penalized, but the risk is lower than that associated with a purely black hat strategy. Black hat strategies completely violate the search engine’s rules.

RELATED TERMS
  1. Marginal Cost Of Production

    Marginal cost of production is the change in total cost that ...
  2. Black

    The term 'black' is used to refer to a company's profitability. ...
  3. Black Market

    A black market is economic activity that takes place outside ...
  4. Deep Web

    The deep web is the secret section of the Internet that is not ...
  5. Black Economy

    The black economy is a segment of a country's economic activity ...
  6. Gray Market

    A gray market is an unofficial market where securities or goods ...
Related Articles
  1. Investing

    Red Hat: Why This Stock Is The Comeback Kid

    Red Hat was buoyed by a first-quarter earnings beat and an upgrade of its stock.
  2. Investing

    Red Hat Stock Jumps on Strong Earnings, Outlook

    Talk about ending a year with a bang: Open-source software leader Red Hat (NYSE: RHT) absolutely nailed its fourth quarter and fiscal 2016, which it reported Monday after the close, and its ...
  3. Trading

    Red Hat Stock Breaks Out After Bullish Q4 Results

    Red Hat shares moved sharply higher following fourth quarter earnings, but technical indicators paint a more bearish picture.
  4. Tech

    The Top 5 Large-Cap Software Stocks for 2016

    Discover the top five large-cap software stocks for 2016, with a summary of each company and what will make the stock appreciate in the upcoming year.
  5. Tech

    Cyber Wars: How The U.S. Stock Market Could Get Hacked

    Stocks are a last great frontier for hackers.
  6. Investing

    3 Reasons These Five Stocks Will Outperform the S&P

    Through extensive screening, Barron's concludes that 3 major attributes boost stocks outperforming.
  7. Financial Advisor

    The Top 6 SEO Tips for Advisors

    Advisors are increasingly relying on search engines for inbound leads. Here's how to improve rankings and drive more search engine traffic to your site.
  8. Tech

    Second Major Ethereum Hack In a Week Leads to $34 Million Theft

    Ethereum suffered two high-profile hacks in a span of just a few days.
  9. Insights

    How Black Markets Work

    Black markets will continue to exist as long as we have regulations and taxes. Discover how they work and what you can buy in the black market.
  10. Financial Advisor

    How Black Millennials Are Closing the Wealth Gap

    African American Millennials are setting up their future children and grandchildren to succeed. Here's how.
RELATED FAQS
  1. What is the difference between revenue and sales?

    Revenue is the income a company generates before any expenses are taken out. Sales are the proceeds from the selling of goods ... Read Answer >>
  2. How is the stock market affected by Thanksgiving and Black Friday?

    Thanksgiving and Black Friday sales numbers are considered to be important indicators for stock market activity throughout ... Read Answer >>
  3. Who Are Google's Main Competitors?

    Explore Google's different revenue segments and its competitors in each, ranging from Microsoft and Yahoo to Moody's Investor ... Read Answer >>
  4. Is Apple Pay safe and free?

    Learn more about Apple Pay, one of Apple's newest and most metamorphic programs that is changing the way consumers purchase ... Read Answer >>
  5. What does the three black crows pattern mean?

    Learn the basics of the three black crows pattern and how analysts and traders interpret this bearish reversal pattern when ... Read Answer >>
  6. How Can I Check If an Old Railroad Bond Has Value?

    Finding out whether an old railroad bond from 1938 still has value is a tough question to answer. It requires research from ... Read Answer >>
Trading Center