What is a Hacker? - Definition & Overview

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: What is Communication Protocol? - TCP/IP & Explanation

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
Your next lesson will play in 10 seconds
  • 0:01 What Is a Hacker?
  • 0:32 Three Types of Hackers
  • 1:17 Black Hat Hacker - Evil Doer
  • 2:58 White Hat Hacker - Savior
  • 4:14 Grey Hat Hacker - Curious
  • 5:24 Lesson Summary
Add to Add to Add to

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up


Recommended Lessons and Courses for You

Lesson Transcript
Instructor: Raymond Blockmon

Raymond has earned a bachelor's degree in computer information systems and a master's degree in organizational leadership.

This lesson describes what a hacker is. Although we associate a hacker with an individual hacking a computer or network system, there are actually three different types of hacker, all with different goals and objectives.

What Is a Hacker, Really?

The basic definition of a hacker is someone who uses a computer system to gain unauthorized access to another system for data or who makes another system unavailable. These hackers will use their skills for a specific goal, such as stealing money, gaining fame by bringing down a computer system, or making a network unavailable -- even sometimes destroying them. However, there are three different types of hackers, each with a particular goal, and not all are the bad guys.

Three Types of Hackers

The three types of hackers are the white hat hacker, the grey hat hacker, and the black hat hacker. Each type of hacker hacks for a different reason, a cause, or both. All have the required skills needed to accomplish their mission. At one end of the spectrum is the black hat, who hacks for evil and malicious intent and without permission. On the other end of the spectrum is the white hat, who hacks against a black hat in order to protect computer and network access and has the company's permission to do so. In the middle is the grey hat, who hacks not for evil and not for good; they are neutral in their cause and usually try to sell their skills for monetary gain, like a mercenary.

Black Hat Hacker - Evil Doer

The black hat hacker is the one who hacks for malicious intent - he is the bad guy. This type of hacker uses his or her skills to steal money or data, knock a computer system offline, or even destroy them. Some of these hackers love to see their work and name in the news, so they would try to target big name organizations and companies. For instance, they might change the front page of a company website.

Black hats also try to break into computer systems to steal credit card information and possibly steal valuable information to sell on the black market. They may even lock out the computer and network system from the owners and then hold them for ransom.

The black hat works outside of the law. This is the hacker that we as a society are most familiar with. Some black hats have cost companies hundreds of millions of dollars in damages for credit card and social security information theft. They can work alone, in that case known as a lone wolf, or with a team. They work slowly and methodically, since the black hat knows it takes patience to compromise a computer or a network system in order to a hit a big payoff and not be caught.

Have you heard of the hacker group called Anonymous or LulzSec? These are black hat hackers whose goals are more driven for a cause rather than monetary gain are known as hactivists. In 2014, following the Michael Brown shooting in the city of Ferguson, Missouri, a group associated with Anonymous said that they will bring down the city and police servers if protestors were harmed in any way.

White Hat Hacker - Savior

The white hat hacker is one who is an ethical hacker. This type of hacker usually hacks for a company or organization for defensive purposes. The white hat is given special permission with limits on what the hacker can and cannot do on their customer's computer and network systems. This special permission is usually given in a legal document signed by both the white hat and the company, which keeps both parties out of legal trouble.

To unlock this lesson you must be a Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use

Become a member and start learning now.
Become a Member  Back
What teachers are saying about
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create An Account