Describe Google hacking and provide an example.

What will be an ideal response?

Another type of security research is called Google hacking. The idea is to use the advanced search options provided by Google to locate more and more information about your target. Although advanced Google searches are not malicious in and of themselves, attackers are using the search to further their recon efforts. For example, a simple search might reveal any site that links to a proposed target. By doing more focused research into a company, however, an attacker can often find additional Internet locations that are not commonly associated with the company - such as business-to-business (B2B) partners and subsidiaries. Armed with this information, the attacker can find the weakest link into the target network.

Computer Science & Information Technology

You might also like to view...

The only way to retrieve a forgotten password to an encrypted database is to contact Microsoft

Indicate whether the statement is true or false

Computer Science & Information Technology

What type of HTML list would be good to use to display a list of terms and their definitions?

a. bullet list b. ordered list c. unordered list d. description list

Computer Science & Information Technology