SlideShare a Scribd company logo
1 of 2
A
While there are several ways of gathering information on a
potential victim, information ciphering is a commonly used
method implemented by cybersecurity criminals via an activity
known as 'footprinting.' Footprinting involves gathering as
much information as one can about a targeted network and its
assets before launching an attack. Companies today use cookies
and XML hooks in order to attach themselves to the surfing
routine of unsuspecting users. This type of footprinting can
traverse multiple personal and business devices, as many
devices now use common authentication infrastructures, which
inherently allow for a single individual or business to be
followed, regardless of the devices that they use. This type of
footprinting, while meant to benefit the marketing efforts of
legit businesses, has been exploited by cybersecurity criminals.
Research footprinting and discuss methodologies that can be
employed by cybersecurity experts to ensure that footprinting
mechanics, such as those aforementioned, can be used
legitimately by businesses, instead of being hijacked by cyber
criminals looking to tail personal or business private data
streams.
B
Social engineering infrastructures can consist of several logical
layers of communication. Some of the components within each
layer may or may not include handlers. That is to say that there
are certain aspects of social engineering infrastructures that are
handled by manual labor, which consists of people watching and
responding to the responses of others on a given social media
network. Other components consists of bots, which feed
responses to users in the form of both true and false
information. The combination of the two component resources
have led to inconsistency in social media technology
infrastructures, as bots and humans compete for communication
distribution space. This has led to a myriad of cybersecurity
issues as bots and humans alike penetrate the information,
endangering the general privacy of those participating on social
media networks. Describe a strategy for dealing with such a
severe issue and discuss the security methodologies you would
deploy to amend the current issues surrounding social network
data vulnerability.

More Related Content

Similar to AWhile there are several ways of gathering information on a

Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalShallu Behar-Sheehan FCIM
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxSALU18
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptxMinnySkyy
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxHateMe9
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...ijcsit
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...AIRCC Publishing Corporation
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsKavita Rastogi
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Visitor management system
Visitor management systemVisitor management system
Visitor management systemmikeecholscyber
 

Similar to AWhile there are several ways of gathering information on a (19)

Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 

More from kacie8xcheco

PSCI 2228 Public Interest GroupsThe second written assignment on t.docx
PSCI 2228 Public Interest GroupsThe second written assignment on t.docxPSCI 2228 Public Interest GroupsThe second written assignment on t.docx
PSCI 2228 Public Interest GroupsThe second written assignment on t.docxkacie8xcheco
 
Providing Security Over Data  Please respond to the following.docx
Providing Security Over Data  Please respond to the following.docxProviding Security Over Data  Please respond to the following.docx
Providing Security Over Data  Please respond to the following.docxkacie8xcheco
 
Provide two PowerPoint slides thatJustify the use of elements by.docx
Provide two PowerPoint slides thatJustify the use of elements by.docxProvide two PowerPoint slides thatJustify the use of elements by.docx
Provide two PowerPoint slides thatJustify the use of elements by.docxkacie8xcheco
 
Provide Apples existing mission statement and code of ethics. I.docx
Provide Apples existing mission statement and code of ethics. I.docxProvide Apples existing mission statement and code of ethics. I.docx
Provide Apples existing mission statement and code of ethics. I.docxkacie8xcheco
 
Provide a summary of your research progress thus far, no more th.docx
Provide a summary of your research progress thus far, no more th.docxProvide a summary of your research progress thus far, no more th.docx
Provide a summary of your research progress thus far, no more th.docxkacie8xcheco
 
Provide a 250 word answer to the below discussion question in apa fo.docx
Provide a 250 word answer to the below discussion question in apa fo.docxProvide a 250 word answer to the below discussion question in apa fo.docx
Provide a 250 word answer to the below discussion question in apa fo.docxkacie8xcheco
 
Property. Please respond to the following Evaluating Dolan v. C.docx
Property. Please respond to the following Evaluating Dolan v. C.docxProperty. Please respond to the following Evaluating Dolan v. C.docx
Property. Please respond to the following Evaluating Dolan v. C.docxkacie8xcheco
 
Properties of LifeChapter 1 of the text highlights the nine pr.docx
Properties of LifeChapter 1 of the text highlights the nine pr.docxProperties of LifeChapter 1 of the text highlights the nine pr.docx
Properties of LifeChapter 1 of the text highlights the nine pr.docxkacie8xcheco
 
PronombresFill in the blanks with the correct words.Raúl y Val.docx
PronombresFill in the blanks with the correct words.Raúl y Val.docxPronombresFill in the blanks with the correct words.Raúl y Val.docx
PronombresFill in the blanks with the correct words.Raúl y Val.docxkacie8xcheco
 
Propose at least three techniques in which the color blind perspecti.docx
Propose at least three techniques in which the color blind perspecti.docxPropose at least three techniques in which the color blind perspecti.docx
Propose at least three techniques in which the color blind perspecti.docxkacie8xcheco
 
Provide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docxProvide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docxkacie8xcheco
 
Prompt Submit a draft of your implementation section. You will gi.docx
Prompt Submit a draft of your implementation section. You will gi.docxPrompt Submit a draft of your implementation section. You will gi.docx
Prompt Submit a draft of your implementation section. You will gi.docxkacie8xcheco
 
PROMPT Think about how 5 of the population of the South managed to.docx
PROMPT Think about how 5 of the population of the South managed to.docxPROMPT Think about how 5 of the population of the South managed to.docx
PROMPT Think about how 5 of the population of the South managed to.docxkacie8xcheco
 
Properties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxProperties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxkacie8xcheco
 
Prompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docxPrompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docxkacie8xcheco
 
PromptHow was St. Franciss message of empathy conveyed in the fr.docx
PromptHow was St. Franciss message of empathy conveyed in the fr.docxPromptHow was St. Franciss message of empathy conveyed in the fr.docx
PromptHow was St. Franciss message of empathy conveyed in the fr.docxkacie8xcheco
 
PromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docxPromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docxkacie8xcheco
 
PROMPT 1Reflecting on the CBS eye logo within the context of co.docx
PROMPT 1Reflecting on the CBS eye logo within the context of co.docxPROMPT 1Reflecting on the CBS eye logo within the context of co.docx
PROMPT 1Reflecting on the CBS eye logo within the context of co.docxkacie8xcheco
 
Project should include your revisions based on faculty feedback, pee.docx
Project should include your revisions based on faculty feedback, pee.docxProject should include your revisions based on faculty feedback, pee.docx
Project should include your revisions based on faculty feedback, pee.docxkacie8xcheco
 
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docx
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docxPrompt 1Ethical ConsiderationsWhen using technology responsibly .docx
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docxkacie8xcheco
 

More from kacie8xcheco (20)

PSCI 2228 Public Interest GroupsThe second written assignment on t.docx
PSCI 2228 Public Interest GroupsThe second written assignment on t.docxPSCI 2228 Public Interest GroupsThe second written assignment on t.docx
PSCI 2228 Public Interest GroupsThe second written assignment on t.docx
 
Providing Security Over Data  Please respond to the following.docx
Providing Security Over Data  Please respond to the following.docxProviding Security Over Data  Please respond to the following.docx
Providing Security Over Data  Please respond to the following.docx
 
Provide two PowerPoint slides thatJustify the use of elements by.docx
Provide two PowerPoint slides thatJustify the use of elements by.docxProvide two PowerPoint slides thatJustify the use of elements by.docx
Provide two PowerPoint slides thatJustify the use of elements by.docx
 
Provide Apples existing mission statement and code of ethics. I.docx
Provide Apples existing mission statement and code of ethics. I.docxProvide Apples existing mission statement and code of ethics. I.docx
Provide Apples existing mission statement and code of ethics. I.docx
 
Provide a summary of your research progress thus far, no more th.docx
Provide a summary of your research progress thus far, no more th.docxProvide a summary of your research progress thus far, no more th.docx
Provide a summary of your research progress thus far, no more th.docx
 
Provide a 250 word answer to the below discussion question in apa fo.docx
Provide a 250 word answer to the below discussion question in apa fo.docxProvide a 250 word answer to the below discussion question in apa fo.docx
Provide a 250 word answer to the below discussion question in apa fo.docx
 
Property. Please respond to the following Evaluating Dolan v. C.docx
Property. Please respond to the following Evaluating Dolan v. C.docxProperty. Please respond to the following Evaluating Dolan v. C.docx
Property. Please respond to the following Evaluating Dolan v. C.docx
 
Properties of LifeChapter 1 of the text highlights the nine pr.docx
Properties of LifeChapter 1 of the text highlights the nine pr.docxProperties of LifeChapter 1 of the text highlights the nine pr.docx
Properties of LifeChapter 1 of the text highlights the nine pr.docx
 
PronombresFill in the blanks with the correct words.Raúl y Val.docx
PronombresFill in the blanks with the correct words.Raúl y Val.docxPronombresFill in the blanks with the correct words.Raúl y Val.docx
PronombresFill in the blanks with the correct words.Raúl y Val.docx
 
Propose at least three techniques in which the color blind perspecti.docx
Propose at least three techniques in which the color blind perspecti.docxPropose at least three techniques in which the color blind perspecti.docx
Propose at least three techniques in which the color blind perspecti.docx
 
Provide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docxProvide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docx
 
Prompt Submit a draft of your implementation section. You will gi.docx
Prompt Submit a draft of your implementation section. You will gi.docxPrompt Submit a draft of your implementation section. You will gi.docx
Prompt Submit a draft of your implementation section. You will gi.docx
 
PROMPT Think about how 5 of the population of the South managed to.docx
PROMPT Think about how 5 of the population of the South managed to.docxPROMPT Think about how 5 of the population of the South managed to.docx
PROMPT Think about how 5 of the population of the South managed to.docx
 
Properties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxProperties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docx
 
Prompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docxPrompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docx
 
PromptHow was St. Franciss message of empathy conveyed in the fr.docx
PromptHow was St. Franciss message of empathy conveyed in the fr.docxPromptHow was St. Franciss message of empathy conveyed in the fr.docx
PromptHow was St. Franciss message of empathy conveyed in the fr.docx
 
PromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docxPromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docx
 
PROMPT 1Reflecting on the CBS eye logo within the context of co.docx
PROMPT 1Reflecting on the CBS eye logo within the context of co.docxPROMPT 1Reflecting on the CBS eye logo within the context of co.docx
PROMPT 1Reflecting on the CBS eye logo within the context of co.docx
 
Project should include your revisions based on faculty feedback, pee.docx
Project should include your revisions based on faculty feedback, pee.docxProject should include your revisions based on faculty feedback, pee.docx
Project should include your revisions based on faculty feedback, pee.docx
 
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docx
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docxPrompt 1Ethical ConsiderationsWhen using technology responsibly .docx
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docx
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

AWhile there are several ways of gathering information on a

  • 1. A While there are several ways of gathering information on a potential victim, information ciphering is a commonly used method implemented by cybersecurity criminals via an activity known as 'footprinting.' Footprinting involves gathering as much information as one can about a targeted network and its assets before launching an attack. Companies today use cookies and XML hooks in order to attach themselves to the surfing routine of unsuspecting users. This type of footprinting can traverse multiple personal and business devices, as many devices now use common authentication infrastructures, which inherently allow for a single individual or business to be followed, regardless of the devices that they use. This type of footprinting, while meant to benefit the marketing efforts of legit businesses, has been exploited by cybersecurity criminals. Research footprinting and discuss methodologies that can be employed by cybersecurity experts to ensure that footprinting mechanics, such as those aforementioned, can be used legitimately by businesses, instead of being hijacked by cyber criminals looking to tail personal or business private data streams. B Social engineering infrastructures can consist of several logical layers of communication. Some of the components within each layer may or may not include handlers. That is to say that there are certain aspects of social engineering infrastructures that are handled by manual labor, which consists of people watching and responding to the responses of others on a given social media
  • 2. network. Other components consists of bots, which feed responses to users in the form of both true and false information. The combination of the two component resources have led to inconsistency in social media technology infrastructures, as bots and humans compete for communication distribution space. This has led to a myriad of cybersecurity issues as bots and humans alike penetrate the information, endangering the general privacy of those participating on social media networks. Describe a strategy for dealing with such a severe issue and discuss the security methodologies you would deploy to amend the current issues surrounding social network data vulnerability.