White Hat
Commonly referred to as the ethical hackers or security experts (in the employ of a company), white hats conduct their hacking operations with the full approval of the target. Their ‘exploits’ are done with the purpose of testing and securing information systems’
integrity from black hats. On the most basic levels, they evaluate known flaws and scan for open ports then emulate what a real hostile attack could entail by employing all necessary tactics and tools that crackers use. White hats are obviously entailed to
fully report their findings to their target.
What are the other terms for white hat?