- Fulfills Steps 1 and 3 of GSUSA Ambassador Cybersecurity Basics badge requirements.
- Leaders – please be aware of double dipping and make your own informed choice.
Info Needed for Step 1 of the badge requirements: All hackers use similar strategies and tools, but their motivations and affiliations set them apart. There are three main categories of hackers: Gray Hat Hackers: Hackers who operate between the two categories, following personal ethics but sometimes breaking laws or acting without permission. White Hat Hackers: Ethical hackers who use their skills legally to protect people and organizations. Black Hat Hackers: Unethical hackers who break into systems for personal or financial gain.
Info Needed for Step 2 of the badge requirements: Think about the balance between protecting individual privacy and ensuring collective safety. Consider how decisions impact trust and security. First are the types of hackers: White Hat, The good guys, fixing problems legally. Gray Hat, They break rules but try to help. Black Hat, The bad guys, causing harm or stealing. Then reflect on what happens when security weaknesses are discovered. Should the information be kept secret, shared publicly, or reported to the organization for improvement? Consider different perspectives like: Government, Wants safety and crime prevention. Companies, Want to protect users’ trust. Hackers and Public, Opinions vary depending on the situation. Realize that decisions have consequences. Will the choice help or harm individuals and organizations?
Items Needed
- Cards listing hacker actions (See suggested list below)
- Three labeled sections on a wall: “White Hat,” “Gray Hat,” and “Black Hat”
- Open space for scouts to run safely
- (Optional) A timer or stopwatch (only allow 15 seconds to make a choice for added challenge)
- (Optional) A scorekeeper to tally successful returns
Instructions
- Divide scouts into two teams and line them up.
- Place the cards with hacker actions in a pile at a central location near the teams. Post the three hacker type labels (“White Hat,” “Gray Hat,” “Black Hat”) on the wall some distance away from the teams.
- (Fulfills Step 1) The first scout from each team races to the pile, draws one card, and runs to the wall. They place the card under the appropriate hacker type section (White Hat, Gray Hat, or Black Hat). The scout then runs back and tags the next scout in line to take their turn.
- (Optional) A designated scorekeeper, keeps a running tally of how many scouts successfully return after placing their cards. Since all cards will be mixed into the three sections on the wall, the scorekeeper tracks success based on completed turns instead of counting the cards.
- (Fulfills Step 3) Once matches are completed, discuss as a group:
- Why does each hacker type behave the way they do?
- What ethical dilemmas might these actions create?
- How do these actions impact privacy, security, and trust?
Suggested Hacker Actions Cards
White Hat Hacker Actions:
- Fixes vulnerabilities with permission from the organization.
- Is hired to test a company’s security system and provide recommendations.
- Writes reports for companies on how to improve their cybersecurity.
- Patches a software vulnerability to prevent future attacks.
- Teaches organizations about protecting themselves from cyberattacks.
- Develops tools to detect and prevent malware or ransomware attacks.
- Advises businesses on creating stronger passwords and security measures.
- Investigates how a hack occurred to help organizations secure their systems.
- Builds secure networks to protect sensitive data.
- Works with law enforcement to expose illegal hacking activities.
Gray Hat Hacker Actions:
- Finds vulnerabilities without permission but reports them publicly.
- Compromises systems without authorization to test their security.
- Informs an organization about a flaw they exploited after the fact.
- Shares weaknesses online to raise awareness but doesn’t exploit them.
- Bypasses security measures for personal challenges or skill-building.
- Creates tools to find vulnerabilities but doesn’t sell or use them maliciously.
- Hacks into systems to gather data for non-malicious purposes, like exposing corruption.
- Explores networks without approval to understand their flaws.
- Publicly critiques companies for weak security without causing damage.
- Uses hacking skills to highlight cybersecurity gaps but doesn’t directly harm anyone.
Black Hat Hacker Actions:
- Hacks into systems to steal sensitive information like credit card details.
- Sells discovered vulnerabilities on the black market for profit.
- Creates and spreads viruses or malware to damage systems.
- Deploys ransomware to lock data and demand payment.
- Uses stolen information to commit fraud or identity theft.
- Builds botnets to flood and shut down websites.
- Exploits vulnerabilities to spy on users without their knowledge.
- Hacks into networks to steal trade secrets or confidential corporate data.
- Manipulates or deletes critical files to harm organizations.
- Targets individuals or businesses for personal revenge or financial gain.