"Know your enemy and know yourself, find naught in fear for 100 battles." — Sun Tzu
Not all hackers are compiled from the same code. They vary in principle, purpose and practice.
In spring every year, some of the country’s best college “white hat hackers” go keyboard to keyboard in the regionals for the National Collegiate Cyber Defense Competition, an annual event presented by Raytheon Technologies, in which university teams operate and defend a network infrastructure.
So what’s a white hat hacker? The following list describes that role and other types of hackers encountered in the wild, wild web.