With the popularity of the network, hackers, dark net, black production, more and more criminals on the network. But now from the country to everyone’s awareness of network security is more and more attention, the evil, white hat, red hat appeared to combat the arrogance of the criminals, so, these several familiar and strange nouns do you know what it means? The following Xiaobian take you together to take an inventory.

1, black

Cyber blackmail refers to illegal acts that, with the Internet as the medium and network technology as the main means, bring potential threats to computer information system security and cyberspace management order, even national security and social and political stability (major security risks). Take the illegal data trading industry.

2, dark net

Dark net is a kind of technical means to provide users with anonymous access to Internet information by using encrypted transmission, P2P network, multi-point relay confusion, etc. Its most prominent feature is anonymity.

Black Hat Hackers

People who hack for illegal purposes, usually for financial gain. They gain access to secure networks to destroy, redeem, modify or steal data, or make the network unusable for authorized users. The name comes from the history of old black and white westerns where villains were easily identified by movie-goers because they wore black hats while the “good guys” wore white hats.

4. White hat hackers

Hackers who use their hacking skills to perform legitimate security test analyses, testing the performance of networks and systems to determine how strong or weak they can withstand breaches.

Red Hat Hackers

In fact, the most accepted term is hongke. Red Hat hackers take justice, morality, progress and strength as their tenet and love the motherland, uphold justice and forge ahead as their spiritual pillars. Red Hat hackers usually use their skills to maintain the security of domestic networks and fight back against foreign attacks.

6, the red team

Usually refers to the attack team in an attack or defense exercise.

7, the blues’

Usually refers to the defensive team in an offensive or defensive exercise.

8, purple

The newly born party in an attack and defense exercise, usually the supervisor or judge.

The two sides of the cyber world like spear and shield, the means and methods will become more and more complex and diverse. With the digital transformation of all walks of life, network security will be more and more concerned by the whole industry and the whole society.