logo

Software Foundations for Cyber Security

   

Added on  2022-08-12

19 Pages1026 Words29 Views
S O F T W A R E
F O U N D A T I O N S
F O R C Y B E R
S E C U R I T Y
N A M E O F T H E S T U D E N T
N A M E O F T H E U N I V E R S I T Y

PART 1:
GOOGLE HACKS AND OPEN
SOURCE INTELLIGENCE

GOOGLE HACKING
TECHNIQUES:
The Google hacking techniques that is also
known as Google Dork is basically a vulnerable
resource for the security researchers. For normal
people, Google is only a search engine that is
used for finding images, texts, videos and many
more. But in the world of infosec, Google is a
much useful tool for hacking. The search engine
of Google is having their own query language
that is built in. It can help in finding information
about SEO backlinks, competitors, tacking

EXPERIMENTING
GOOGLE HACKING
TECHNIQUES WITH
FACEBOOK.COM:
For the research with queries of Google hacking,
I have chosen facebook.com. Facebook is having
a huge database as it is having billions of
members. The organisation has been subject for
covering extensive media as well as many
controversies. They are often involving political
manipulation, privacy of the users, copyright
infringement etc. Various Google hacking
techniques will be experimented by using the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Google Hacks and Open Source Intelligence
|9
|344
|34

Outline for a Security Program Management Tabletop
|9
|669
|25

Addressing Cyber Security Risks Information 2022
|1
|557
|17

Computer Network Investigation
|20
|1358
|67

Forensics and Incident Response (DFIR) - Assignment
|4
|837
|21

Conducting a Security Analysis Baseline for Organizational Protection
|17
|4323
|178