file please
Get perfect grades by consistently using www.college-experts.com. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20
Order a Similar Paper Order a Different Paper
file please
file please
Using all you have learned, use the methods/tools learned within this course to investigate an organization of your choosing. Write a 3–4-page paper, identifying items you have uncovered within the open-source world. Remember you must apply all you have learned from this course. *Please refer to the APA template for assignment submission. I have attached some file to help you doing the subject. Like all the discussion we did to give any idea of the stuff we learned through this class. Below are all the homework we did through this week to give an idea of what we did in class with the discussion Please the exercise is on the top at least 3 full page without the reference and tiltle page Thank you, please help. This was assignment 1 Instructions: Identify an organization that you will investigate over the course labs. However, do not choose a government organization, individual, or entity that may be considered a violation of privacy. Task: Identify 15 factors about the organization that could provide information about the organization, and how you would research these. Submittal: Submit using the Grid Association Matrix. (only focus on page 1 of the grid association matrix) This was Asignment 2 You will write a 2-3 page paper. Task: Describe how the interrogation process can be used to supplement your organizations collection plan. This was assignment 3 Visit the website Google Hacking Database (https://www.exploit-db.com/google-hacking-database). You will write a 2-3 page paper. Task: Identify 15 dork strings: 1. What syntax will be necessary to gain the information? 2. What information do you expect to gain from the dorks? 3. When you ran the dorks, what was returned? Did you receive any errors? If so, what were they? What actions did you take to correct the errors? Were you able to recover from the errors? Instructions: You will write a 2-3 page paper. Task: Describe how OSINT can be used to supplement your organizational collection plan. Describe how Google Dorks can play a part in your collection plan as well. Which dorks would you use? This was assignment 4 a-b A Instruction: Review the view on Google Dorking. Task: Google Dorking https://youtu.be/6dRT5VEvIo8 Links to an external site.- can also be found at TryHackMe | Google DorkingLinks to an external site. Write a 2 page report on how Google Dorking can used for good and evil. B Lab 01 (Google Hack) Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use. Google hacking involves using advanced operators/keywords in the Google search engine to locate/filter out desired results from the Google database. Google Hacking Database (GHDB) – collections of google dorks that we can use to gather/get interesting information from google. https://www.exploit-db.com/google-hacking-database/Links to an external site. From the exploit-db website, select 3 DIFFERENT categories of vulnerabilities. Perform the selected dork strings in the Google search engine and capture (screenshot or copy/paste) the information from each of dork string that you used and place it in a Microsoft Word document to be submitted. Assignment 5 a-b A Instructions: Review your collection plan submitted in Week 1. You will write a short 2-3 page paper. Task: Write a review of your collection plan and techniques, answering the following. Identify if your collection plan and techniques have changed since your initial collection plan was created. Identify why the techniques used initially may vary from what you would use today. What if any, interesting fact have you gained from the discussion questions? B Instructions: Write a short 2-3 page paper based on the organization you selected in week 1. Task: You are an analyst, and you need to describe the following to your supervisors: Identify why you need to report your findings. How should the findings be structured to gain the attention of your organization? Describe why you selected the structure you did? This assignment 6 a-b Instructions: Review the OSINT Resource Tools List Task: Write a 2-3 page paper reviewing 10-15 different Tools. Identify the types of data that can be retrieved. Provide feedback on the sites utility.
file please
All discussion from week 1-5 to give an idea to what we discused Discusion:1 DQ1: How does OSINT contribute to the overall security picture? DQ2: What is a collection plan? Why would an organization/you need one? Discussion 2 DQ1: Why is the screening process so integral to the overall interrogation process? DQ2: How would you adapt this process for cybersecurity work? Discussion 3 What is a Google dork? What is it used in? Is it helpful for hacking? Discussion 4 DQ1: You want to use Google dorks to footprint the site but only want results that show file extensions, what Google dork operators would you use, and why? Discussion 5 What are some common pitfalls of intelligence analysis, and how can you avoid them? I will also submit some paper from assignment we did through the semester to give an idea. This for assignment 2 Als I will attached my organization

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.
Get a 15% discount on your order using the following coupon code SAVE15
Order a Similar Paper Order a Different Paper