SlideShare a Scribd company logo
A
While there are several ways of gathering information on a
potential victim, information ciphering is a commonly used
method implemented by cybersecurity criminals via an activity
known as 'footprinting.' Footprinting involves gathering as
much information as one can about a targeted network and its
assets before launching an attack. Companies today use cookies
and XML hooks in order to attach themselves to the surfing
routine of unsuspecting users. This type of footprinting can
traverse multiple personal and business devices, as many
devices now use common authentication infrastructures, which
inherently allow for a single individual or business to be
followed, regardless of the devices that they use. This type of
footprinting, while meant to benefit the marketing efforts of
legit businesses, has been exploited by cybersecurity criminals.
Research footprinting and discuss methodologies that can be
employed by cybersecurity experts to ensure that footprinting
mechanics, such as those aforementioned, can be used
legitimately by businesses, instead of being hijacked by cyber
criminals looking to tail personal or business private data
streams.
B
Social engineering infrastructures can consist of several logical
layers of communication. Some of the components within each
layer may or may not include handlers. That is to say that there
are certain aspects of social engineering infrastructures that are
handled by manual labor, which consists of people watching and
responding to the responses of others on a given social media
network. Other components consists of bots, which feed
responses to users in the form of both true and false
information. The combination of the two component resources
have led to inconsistency in social media technology
infrastructures, as bots and humans compete for communication
distribution space. This has led to a myriad of cybersecurity
issues as bots and humans alike penetrate the information,
endangering the general privacy of those participating on social
media networks. Describe a strategy for dealing with such a
severe issue and discuss the security methodologies you would
deploy to amend the current issues surrounding social network
data vulnerability.

More Related Content

Similar to AWhile there are several ways of gathering information on a

F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
SALU18
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
HateMe9
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 

Similar to AWhile there are several ways of gathering information on a (19)

Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 

More from kacie8xcheco

Provide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docxProvide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docx
kacie8xcheco
 
Prompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docxPrompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docx
kacie8xcheco
 
PromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docxPromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docx
kacie8xcheco
 

More from kacie8xcheco (20)

PSCI 2228 Public Interest GroupsThe second written assignment on t.docx
PSCI 2228 Public Interest GroupsThe second written assignment on t.docxPSCI 2228 Public Interest GroupsThe second written assignment on t.docx
PSCI 2228 Public Interest GroupsThe second written assignment on t.docx
 
Providing Security Over Data  Please respond to the following.docx
Providing Security Over Data  Please respond to the following.docxProviding Security Over Data  Please respond to the following.docx
Providing Security Over Data  Please respond to the following.docx
 
Provide two PowerPoint slides thatJustify the use of elements by.docx
Provide two PowerPoint slides thatJustify the use of elements by.docxProvide two PowerPoint slides thatJustify the use of elements by.docx
Provide two PowerPoint slides thatJustify the use of elements by.docx
 
Provide Apples existing mission statement and code of ethics. I.docx
Provide Apples existing mission statement and code of ethics. I.docxProvide Apples existing mission statement and code of ethics. I.docx
Provide Apples existing mission statement and code of ethics. I.docx
 
Provide a summary of your research progress thus far, no more th.docx
Provide a summary of your research progress thus far, no more th.docxProvide a summary of your research progress thus far, no more th.docx
Provide a summary of your research progress thus far, no more th.docx
 
Provide a 250 word answer to the below discussion question in apa fo.docx
Provide a 250 word answer to the below discussion question in apa fo.docxProvide a 250 word answer to the below discussion question in apa fo.docx
Provide a 250 word answer to the below discussion question in apa fo.docx
 
Property. Please respond to the following Evaluating Dolan v. C.docx
Property. Please respond to the following Evaluating Dolan v. C.docxProperty. Please respond to the following Evaluating Dolan v. C.docx
Property. Please respond to the following Evaluating Dolan v. C.docx
 
Properties of LifeChapter 1 of the text highlights the nine pr.docx
Properties of LifeChapter 1 of the text highlights the nine pr.docxProperties of LifeChapter 1 of the text highlights the nine pr.docx
Properties of LifeChapter 1 of the text highlights the nine pr.docx
 
PronombresFill in the blanks with the correct words.Raúl y Val.docx
PronombresFill in the blanks with the correct words.Raúl y Val.docxPronombresFill in the blanks with the correct words.Raúl y Val.docx
PronombresFill in the blanks with the correct words.Raúl y Val.docx
 
Propose at least three techniques in which the color blind perspecti.docx
Propose at least three techniques in which the color blind perspecti.docxPropose at least three techniques in which the color blind perspecti.docx
Propose at least three techniques in which the color blind perspecti.docx
 
Provide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docxProvide a 150 word response to the below discussion question answer .docx
Provide a 150 word response to the below discussion question answer .docx
 
Prompt Submit a draft of your implementation section. You will gi.docx
Prompt Submit a draft of your implementation section. You will gi.docxPrompt Submit a draft of your implementation section. You will gi.docx
Prompt Submit a draft of your implementation section. You will gi.docx
 
PROMPT Think about how 5 of the population of the South managed to.docx
PROMPT Think about how 5 of the population of the South managed to.docxPROMPT Think about how 5 of the population of the South managed to.docx
PROMPT Think about how 5 of the population of the South managed to.docx
 
Properties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxProperties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docx
 
Prompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docxPrompt Write a short paper that describes a public health issue a.docx
Prompt Write a short paper that describes a public health issue a.docx
 
PromptHow was St. Franciss message of empathy conveyed in the fr.docx
PromptHow was St. Franciss message of empathy conveyed in the fr.docxPromptHow was St. Franciss message of empathy conveyed in the fr.docx
PromptHow was St. Franciss message of empathy conveyed in the fr.docx
 
PromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docxPromptOur readings from this unit engage with the topic of economi.docx
PromptOur readings from this unit engage with the topic of economi.docx
 
PROMPT 1Reflecting on the CBS eye logo within the context of co.docx
PROMPT 1Reflecting on the CBS eye logo within the context of co.docxPROMPT 1Reflecting on the CBS eye logo within the context of co.docx
PROMPT 1Reflecting on the CBS eye logo within the context of co.docx
 
Project should include your revisions based on faculty feedback, pee.docx
Project should include your revisions based on faculty feedback, pee.docxProject should include your revisions based on faculty feedback, pee.docx
Project should include your revisions based on faculty feedback, pee.docx
 
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docx
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docxPrompt 1Ethical ConsiderationsWhen using technology responsibly .docx
Prompt 1Ethical ConsiderationsWhen using technology responsibly .docx
 

Recently uploaded

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 

AWhile there are several ways of gathering information on a

  • 1. A While there are several ways of gathering information on a potential victim, information ciphering is a commonly used method implemented by cybersecurity criminals via an activity known as 'footprinting.' Footprinting involves gathering as much information as one can about a targeted network and its assets before launching an attack. Companies today use cookies and XML hooks in order to attach themselves to the surfing routine of unsuspecting users. This type of footprinting can traverse multiple personal and business devices, as many devices now use common authentication infrastructures, which inherently allow for a single individual or business to be followed, regardless of the devices that they use. This type of footprinting, while meant to benefit the marketing efforts of legit businesses, has been exploited by cybersecurity criminals. Research footprinting and discuss methodologies that can be employed by cybersecurity experts to ensure that footprinting mechanics, such as those aforementioned, can be used legitimately by businesses, instead of being hijacked by cyber criminals looking to tail personal or business private data streams. B Social engineering infrastructures can consist of several logical layers of communication. Some of the components within each layer may or may not include handlers. That is to say that there are certain aspects of social engineering infrastructures that are handled by manual labor, which consists of people watching and responding to the responses of others on a given social media
  • 2. network. Other components consists of bots, which feed responses to users in the form of both true and false information. The combination of the two component resources have led to inconsistency in social media technology infrastructures, as bots and humans compete for communication distribution space. This has led to a myriad of cybersecurity issues as bots and humans alike penetrate the information, endangering the general privacy of those participating on social media networks. Describe a strategy for dealing with such a severe issue and discuss the security methodologies you would deploy to amend the current issues surrounding social network data vulnerability.