and answer latest update
Google, Facebook, LinkedIn
Examples of data domains
IoT
Internet of Things
GIS
Geospatial Information Systems
White Hat Hackers
Legalized hackers who are payed to find vulnerabilities
Grey Hat Hackers
Hackers who perform illegal actions, but not for personal gain or to cause damage
Black Hat Hackers
Illegal hackers who hack for personal gain
Script Kiddies
Hackers having little or no skill, often using existing tools or instructions to launch attacks.
Organized Hackers
These criminals include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored
hackers.
Hacktivists
Grey hat hackers who hack for ethical and political reasons
Vulnerability Brokers
Usually grey hat hackers who discover exploits and report them to vendors, for prizes or rewards.
State Sponsored Hackers
Hackers hired by governments, they can be any hat colour depending on perspective
Cyber Criminals
Black hat hackers who hack for gain
Defenses against cyber criminals
Vulnerability Databases, Early Warning Systems, Share Cyber Intelligence, ISM Standards, New Laws
Critical cybersecurity threats