White hat is the name given to ethical computer hackers. White hats are becoming a necessary part of the information security field. The term bears strong connotations, migrated to computers, was coined by Richard Stallman. The Newsweek article appears to be the first use of the word hacker. Script kiddie a script kiddie is an unskilled hacker. Microsoft uses the term BlueHat to represent a series. Vulnerability analysis Identifying potential ways of attack. Approach is to search for possible vulnerabilities in the code. Attack patterns are defined as series of repeatable steps. Ed Cummings are a longstanding writer for the 2600 hacker. Susan Headley was an American hacker during the active, late 1970s. Kevin Mitnick is a computer security consultant, author. Len Sassaman was a Belgian computer programmer, technologist. The computer underground is compared to the Wild West. Efforts to protect important information systems date ba ck, several decades. CERT is a central reporting Center for Internet security problems.