Describe Google hacking and provide an example.

What will be an ideal response?


Another type of security research is called Google hacking. The idea is to use the advanced search options provided by Google to locate more and more information about your target. Although advanced Google searches are not malicious in and of themselves, attackers are using the search to further their recon efforts. For example, a simple search might reveal any site that links to a proposed target. By doing more focused research into a company, however, an attacker can often find additional Internet locations that are not commonly associated with the company - such as business-to-business (B2B) partners and subsidiaries. Armed with this information, the attacker can find the weakest link into the target network.

Computer Science & Information Technology

You might also like to view...

Audio content developers use a codec (compressor/decompressor) to reduce a digital media file's required storage space and to transfer the file across the Internet quickly and smoothly.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The five basic components or subsystems of biometric ID systems are:

A. data collection, transmission, signal processing, storage, decision B. feature extraction, quality control, pattern matching, and pattern classification C. data collection, quality control, pattern matching, transmission D. data collection, transmission, signal processing, storage, quality control E. none of the above

Computer Science & Information Technology

PING and TRACERT use what protocol for error messages.

A. DMZ B. LCD C. ICMP D. STP

Computer Science & Information Technology

Bitmapped images are resolution-independent, maintaining their level of detail when magnified.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology