Cybersecurity Project: Google Hacking and Security Program Design

Verified

Added on  2022/08/12

|9
|344
|34
Project
AI Summary
This project focuses on cybersecurity reconnaissance using Google Hacking and Open Source Intelligence (OSINT) techniques. The assignment involves using Google Dorking to gather information about a target organization, specifically Facebook. The student experimented with various Google hacking queries to discover information related to SEO backlinks, competitors, and potential web vulnerabilities. The project also includes an outline for a security program management tabletop exercise, focusing on the NIST Cybersecurity Framework's five pillars: Identify, Protect, Detect, Respond, and Recover, with a specific focus on the 'Identify' pillar, assessing risks, threats, and vulnerabilities. The solution references relevant cybersecurity publications and research papers to support the methodologies used. The assignment is presented as a PowerPoint presentation, detailing the searches and tools used to gather information. The project is a part of group assignment and the solution covers the portion that the student was assigned to do.
Document Page
PA RT 1 :
G O O G L E H A C K S
A N D O P E N S O U R C E
I N T E L L I G E N C E
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
GOOGLE HACKING
TECHNIQUES:
The Google hacking techniques that is also
known as Google Dork is basically a vulnerable
resource for the security researchers. For normal
people, Google is only a search engine that is
used for finding images, texts, videos and many
more. But in the world of InfoSec, Google is a
much useful tool for hacking. The search engine
of Google is having their own query language
that is built in. It can help in finding information
about SEO backlinks, competitors, tacking
Document Page
EXPERIMENTING GOOGLE
HACKING TECHNIQUES WITH
FACEBOOK.COM:
For the research with queries of Google hacking,
I have chosen facebook.com. Facebook is having
a huge database as it is having billions of
members. The organisation has been subject for
covering extensive media as well as many
controversies. They are often involving political
manipulation, privacy of the users, copyright
infringement etc. Various Google hacking
techniques will be experimented by using the
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
REFERENCES:
Baloch, R. (2017). Ethical hacking and penetration testing guide. Auerbach
Publications.
Amara, N., Zhiqui, H., & Ali, A. (2017, October). Cloud computing security
threats and attacks with their mitigation techniques. In 2017 International
Conference on Cyber-Enabled Distributed Computing and Knowledge
Discovery (CyberC) (pp. 244-251). IEEE.
Nastase, R. (2018). Hacking with Kali Linux: A step by step guide for you to
learn the basics of cybersecurity and hacking. Independently published.
Smith, L. (2016). Information Behaviors of Ethical Hackers.
Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly
detection techniques. Journal of Network and Computer Applications, 60,
19-31.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]