Preview

hackers

Satisfactory Essays
Open Document
Open Document
377 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
hackers
White Hat Hackers- These are Hackers that try to break into systems in order to help a company/corporation find the weaknesses in their system. They have no malicious intent and they are used to deter black hat hackers.

Black Hat Hackers- Hackers with malicious intent that try to hack into corporation websites, people’s personal info, and whatever other helpful info they can get ahold of that will benefit them financially.
Gray Hat Hackers- These are hackers that do it just for the sport of it. They typically don’t have any malicious intent behind their hacking but only want to see if they can do it as a challenge.

For the past 9 years I have been working in the pharmaceutical manufacturing field producing drugs in a GMP environment. Currently, I work for a company that produces cancer drugs. The majority of my work duties are performed in a sterile environment under a class 100 hood. Over the course of my work experience in the pharmaceutical field I have been exposed to various high grade equipment, job duties, procedures, and validation teams that would make me a perfect candidate for your opening.

As you can see from my resume, I have an extensive background in the manufacturing field. I would love the challenge of breaking into the bio manufacturing field because I know that it has a very strong future and is very important to the development of our society. With the experience I have gained over the years I am confident I could perform at consistently high levels for your company.

Jonathan James was the first black hat hacker juvenile at the age of 16 to be sentenced to serve time in a juvenile detention center. He broke successfully hacked into NASA and the Department of Defense and had access to highly confidential information. While he didn’t steal anything he did cause tens of thousands of dollars in damage repairing systems. After his release he was later tied to a ring of hackers that were involved in a credit card scam that stole

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. Vulnerability scans performed from external hosted servers give the same perspective as an attacker. Two types of hacking are White hats which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. Black Hats are individuals that break into systems or networks that are not authorized to.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Study Guide

    • 790 Words
    • 4 Pages

    9. Which type of attacker intends to be helpful? White-hat hackers - Ethical hacking...Intending to be helpful.…

    • 790 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A gray hat may gain unauthorized access to a computer system to raise awareness—expose flaws to improve security—of a stubborn or uninformed administrator. Although there is no malicious intent, the lack of authorization creates a criminal act that can be prosecuted if received poorly.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Anonymous Group

    • 1592 Words
    • 7 Pages

    They sometimes are referred to as “hactivists”, which means they act like activists but hacking computers using the Internet in order to carry out their objectives. They claim they don’t have a leader, but still act in a…

    • 1592 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Brian Knappenberger writes and creates a film which portrays a special and expert hacking group, their inside workings, plans and beliefs which they use and test to carry out their cyber-attacks.…

    • 771 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The black market is run by an assortment of hackers. There is no “typical hacker” and the reason why it is so hard to stereotype them or identify them.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cover Letter

    • 1197 Words
    • 5 Pages

    I am a good team player who enjoy working with people and have had to work alone when the need arises using own initiative. I am able to stay calm in difficult situations and have the ability to work well under pressure. If considered for the above vacancy, I would relish the challenge of working for such a high profile company such as yours.…

    • 1197 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays