Name that Hacker

Fulfills Step 1 of GSUSA Ambassador Cybersecurity Basics badge requirements.

Info Needed for the badge requirements: All hackers use similar strategies and tools, but their motivations and affiliations set them apart. There are three main categories of hackers: Gray Hat Hackers: Hackers who operate between the two categories, following personal ethics but sometimes breaking laws or acting without permission. White Hat Hackers: Ethical hackers who use their skills legally to protect people and organizations. Black Hat Hackers: Unethical hackers who break into systems for personal or financial gain.

Items Needed

  • VTK Name That Hacker Cards by GSUSA (print and cut ahead of time)
  • Whiteboard or chart paper with three columns labeled:
    • “Black Hat Hacker” on the left
    • “Gray Hat Hacker” in the middle
    • “White Hat Hacker” on the right

Instructions

  1. Pair the scouts up. Give each pair a Name That Hacker! card.
  2. Scouts work in pairs to place their card in the column where they believe it belongs.
  3. Discuss where the cards are placed and why.

Suggested Answers

  • White Hat Hacker:
    • A hacker discovers a security vulnerability in a program and reports it to the developer to fix immediately.
    • A hacker is employed to test an organization’s security and provides recommendations to improve it.
  • Gray Hat Hacker:
    • A hacker discovers a security vulnerability in a program and shares the information publicly.
    • A hacker compromises a system without permission but tells the organization about the vulnerabilities.
  • Black Hat Hacker:
    • A hacker creates a botnet to flood and shut down a disliked website.
    • A hacker launches an attack to steal credit card numbers.
    • A hacker finds a security vulnerability in a program and sells it on the black market.