Skip to Content
Baker College Baker College Alternate Logo
  • Apply
  • Visit
  • Request Info
  • (855) 487-7888
Apply Visit Request Info
  • Academics
    • Undergraduate Studies
      • College of Business
      • College of Education
      • College of Engineering and Information Technology
      • College of Health Science
        • School of Nursing
        • School of Occupational Therapy
      • College of Liberal Arts and Sciences
      • College of Social Science
    • Online Learning
      • Baker Online
    • Graduate Studies
      • Center for
        Graduate Studies
    • Affiliated Institutions
        • Auto / Diesel
        • Culinary Institute of Michigan
    • Resources
      • Create a Customized Viewbook 2020-2021 - Program Catalog 2020-2021 - Student Handbook
        • Academic Calendar
        • Full Program List
        • Full Course List
  • Admissions & Aid
    • Undergraduate Admissions
      • Undergraduate Admissions Events
      • Apply Undergraduate
      • Application Requirements
    • Tuition & Aid
      • Scholarships
      • Tuition
      • Financial Aid
      • Grants
      • Loans
      • Net Price Calculator
    • Graduate Admissions
      • Accelerated Path
      • Apply Graduate
      • Application Requirements
      • Transfer Credits
    • Transfer Students
      • Transferring Credits
      • Bridge to Bachelor’s
      • Transfer Scholarships
      • Transfer Tuesday Events
      • Transfer Application Checklist
    • Other
      • Running Start
      • New Student Orientation
      • Military Friendly
      • Discover Your Major
      • Direct Admission Programs
      • International Students
  • Student Services
    • Living
      • Student Housing
      • Campus Safety
      • Student Life
    • Resources
      • Bookstore
      • OneStop
      • Academic Resource Center
      • Learning Support Services
      • Disability Services
    Featured Event
    Virtual Auto / Diesel Institute of Michigan Event
    Tuesday
    Feb. 2nd
    Learn more
  • Campuses
    • Michigan
      • Auburn Hills
      • Cadillac
      • Jackson
      • Muskegon
      • Owosso
      • Royal Oak
      • Auto/Diesel Institute
      • Culinary Institute - Muskegon
      • Culinary Institute - Port Huron
    • Global Campuses
      • Center for Graduate Studies
      • Baker Online
    Featured Event
    Virtual College of Education Event
    Wednesday
    Feb. 3rd
    Learn more
  • About Baker
    • Get to Know Us
      • Guiding Principles
      • BakerProud
      • News
      • Events
      • Blog
      • Office of the President
      • Accreditation
      • History
      • Not for Profit
      • Careers
    Featured News
    Baker College RESD Students Raise Funds for the Homeless
    Learn More
  • Tools & Resources
    • Current Students & Faculty
      • My Baker
      • Canvas
      • Baker Mail
      • Style Guide
    Featured Event
    Virtual Transfer Student Event
    Wednesday
    Feb. 3rd
    Learn more
  • Alumni
    • Alumni Resources
      • Transcripts
  • Employers
    • Employers Resources
      • Career Services
      • Handshake
    Featured Event
    Virtual College of Business Event
    Thursday
    Feb. 4th
    Learn more
News
  • About Baker
  • Get to Know Us
  • News
  • How White Hat Hackers Are Shaking Up Cyber Security
Filter by
Filter By:
Cancel Apply
In the News

How White Hat Hackers Are Shaking Up Cyber Security

January 6, 2017
How White Hat Hackers Are Shaking Up Cyber Security

Hacking is not outright unethical -- in the right context, it can actually prove quite useful for corporations and government entities in need of enhanced security protocol. Organizations would much rather have security problems uncovered by hackers they've hired themselves than leave those vulnerabilities open for exploitation by unethical hackers. Hence, the popularity of white hat hacking, in which hacking skills are used to detect security issues in advance.

Increased Security Breaches: Why White Hat Hackers are So Important

White hat hackers are becoming increasingly prevalent due to the need for better defense against sophisticated black hat (malicious) hackers. Even seemingly minor hacks can prove incredibly costly, both for impacted organizations and the population at large. According to CNN, the Ponemon Institute of Cyber Crime estimates that hacking costs the average firm a whopping $15.4 million per year. Furthermore, a 2014 report funded by McAfee and published by the Center for Strategic and International Studies found that hackers cost the global economy over $445 billion each year. It makes sense, then, for companies to either employ in-house white hat hackers or to pay the public to point out potential security issues.

Ethical Hacking: Salary and Benefits

Given the high demand for ethical hackers, it is increasingly common for major corporations and government agencies to keep their employed hackers in-house, where these skilled employees earn a very comfortable living, complete with healthcare and retirement benefits. The Bureau of Labor Statistics has not yet compiled salary information specifically for white hat hackers, but according to Indeed, the average certified ethical hacker earns an impressive $104,000 per year. This is a significant increase over the annual $90,120 salary for information security analysts (a similar job title with significant overlap in job duties) reported by the BLS.

Although many of today's hackers are employed in-house, some prefer to work as consultants or on a freelance basis. These ethical hackers enjoy greater control over their schedules, and in some cases, the ability to command a far higher salary. There is greater risk involved in this career path, however, especially for those who seek earnings through public reward programs.

White Hat Hacker Reward Programs

Some corporations, in addition to hiring hackers in-house, offer extensive reward programs for outside hackers who successfully identify security issues -- and more importantly, notify the appropriate parties of these problems. Notable examples include Google and Apple, both of which have offered significant monetary awards to successful white hat hackers. These programs are often referred to as bug bounties, and for those with a little technical skill and a lot of persistence, they can lead to tens, even hundreds of thousands in income.

Google's Vulnerability Reward Program is one of the most notable examples of a bug bounty, and sometimes, its rewards reach well over five figures. For example, in late 2014, Google awarded a team of Polish security researchers $50,000 after they uncovered security issues with the App Engine. After a long wait, Apple released a similar bug bounty program in 2016, but restricted it to an invite-only basis.

Training and Education For White Hat Hackers

White hat hackers are often thought of as self-taught individuals who spend all of their spare time tinkering with security systems. While this is true in some cases, ethical hackers increasingly prefer to seek out training from accredited academic programs, as the right credentials can significantly expand their earning potential. The Bachelor of Science in Cyber Defense is a popular option, as it provides not only a broad base of information security knowledge, but also specific training in perimeter network security and internet work operations. With this degree, students can pursue white hat hacking jobs or set their sights on a more traditional path, such as information security or network administration.

The sophistication of today's black hat hackers is startling, but with the help of white hat experts, corporations and government agencies are beginning to catch up. If you are interested in using your technical prowess to earn a comfortable living -- and more importantly, to perform public works and improve the global economy -- white hat hacking may be a viable career path.

Source

https://www.techopedia.com/definition/10349/white-hat-hacker

http://www.businessinsider.com/google-pays-50000-to-white-hat-hacker-2014-12

http://money.cnn.com/2015/10/08/technology/cybercrime-cost-business/

http://www.pcworld.com/article/250045/how_to_become_an_ethical_hacker.html

http://www.indeed.com/salary/Certified-Ethical-Hacker.html

Follow Baker College

Popular Tags

Alumni Application Deadlines Baker Online Explore your Options Graduation In The News Speaking engagement Student Life

Filter by Campus

Filter by Campus

Recent News

Baker College of Owosso’s New Veterinary Technology Facility Welcomes First Students

Read More
Student Team from College of Business at Baker College Wins IACBE 2020 Virtual Live Case Competition

Read More
Henry Ford College and Baker College Sign Articulation Agreement

Read More
We're Here to Help
Ready to take the next step?

Contact us today to speak with a
Baker admissions expert.












reCAPTCHA helps prevent automated form spam.
The submit button will be disabled until you complete the CAPTCHA.


Admissions

Apply
  • Online
  • Undergraduate Admissions
  • Graduate Admissions
  • Tuition & Aid
  • International Students
  • Transfer Students
  • Military Friendly
  • Running Start

About Baker

Schedule a Visit
  • Get to Know Us
  • Mission & Vision
  • Accreditation
  • News
  • Events
  • Blog
  • Careers

Tools & Resources

Request Info
  • My Baker
  • Canvas
  • Baker Mail
  • Bookstore
  • Academic Resource Center

Contact Us

(855)487-7888
  • 1020 S Washington St, Owosso, MI 48867

  • Phone: (800) 964-4299

  • Policies & Procedures

  • Disclosure of Consumer Information

  • Privacy Policy

  • Facebook Icon Youtube Icon Twitter Icon Instagram Icon Linkedin Icon
  • Disclosure of Consumer Information

  • Policies & Procedures

  • Privacy Policy

Baker College
  • Facebook Youtube Twitter Instagram Linkedin
Baker College

Accredited by The Higher Learning Commission. An equal opportunity affirmative action institution. An approved institution of the National Council for State Authorization Reciprocity Agreements (NC-SARA) and the Midwestern Higher Education Compact (MHEC)

© 2020 All rights reserved. Baker College
affiliated-institution-4 themed themed--adi