Cybersecurity Project: Google Hacking and Security Program Outline

Verified

Added on  2022/08/12

|19
|1026
|29
Project
AI Summary
This project is divided into two main parts. Part 1 focuses on Google hacking and open-source intelligence (OSINT), using Google Dorking techniques to gather information about a target organization (Facebook). The student experiments with various search queries to uncover potential vulnerabilities and information. Part 2 outlines a security program management tabletop exercise, covering configuration and patch management, incident response, email security awareness training, and disaster recovery planning. The outline includes documentation, change justification, testing, and communication protocols. The incident response plan details steps for handling security breaches, while the email security training emphasizes awareness of email-borne threats. Finally, the disaster recovery plan outlines steps for resuming operations after an unplanned incident. The project concludes by emphasizing the importance of a comprehensive information security plan in protecting organizational data and ensuring confidentiality, integrity, and availability.
Document Page
S O FT WA R E
F O U N DAT I O N S
F O R CY B E R
S E C U R I T Y
N A M E O F T H E S T U D E N T
N A M E O F T H E U N I V E R S I T Y
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PART 1:
GOOGLE HACKS AND OPEN SOURCE
INTELLIGENCE
Document Page
GOOGLE HACKING
TECHNIQUES:
The Google hacking techniques that is also
known as Google Dork is basically a vulnerable
resource for the security researchers. For normal
people, Google is only a search engine that is
used for finding images, texts, videos and many
more. But in the world of infosec, Google is a
much useful tool for hacking. The search engine
of Google is having their own query language
that is built in. It can help in finding information
about SEO backlinks, competitors, tacking
Document Page
EXPERIMENTING GOOGLE
HACKING TECHNIQUES WITH
FACEBOOK.COM:
For the research with queries of Google hacking,
I have chosen facebook.com. Facebook is having
a huge database as it is having billions of
members. The organisation has been subject for
covering extensive media as well as many
controversies. They are often involving political
manipulation, privacy of the users, copyright
infringement etc. Various Google hacking
techniques will be experimented by using the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
Document Page
REFERENCES:
Baloch, R. (2017). Ethical hacking and penetration testing guide. Auerbach
Publications.
Amara, N., Zhiqui, H., & Ali, A. (2017, October). Cloud computing security
threats and attacks with their mitigation techniques. In 2017 International
Conference on Cyber-Enabled Distributed Computing and Knowledge
Discovery (CyberC) (pp. 244-251). IEEE.
Nastase, R. (2018). Hacking with Kali Linux: A step by step guide for you to
learn the basics of cybersecurity and hacking. Independently published.
Smith, L. (2016). Information Behaviors of Ethical Hackers.
Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly
detection techniques. Journal of Network and Computer Applications, 60,
19-31.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PART 2.
OUTLINE FOR A SECURITY
PROGRAM MANAGEMENT
TABLETOP EXERCISE
Document Page
METHOD FOR
CONFIGURATION AND PATCH
MANAGEMENT.The methods for configuration and patch management
are including:
Documentation and identification of changes.
Rationale or justification.
Assessment if potential changes and impact that
include criticality and implications of security.
Testing processes for ensuring the changes are
functioning as intended.
Updating all of the system documentations those are
appropriate upon the completion of significant changes.
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]