footprint.docx - DIGITAL FOOTPRINTING: ANALYSIS, TOOLS AND...

This preview shows page 1 - 4 out of 6 pages.

DIGITALFOOTPRINTING:ANALYSIS, TOOLSAND TECHNIQUES
ContentsINTRODUCTION.......................................................................................................................2OBJECTIVES..............................................................................................................................2FOOTPRINTING TOOLS AND TECHNIQUES.......................................................................2TYPES OF INFORMATION FOOTPRINTING PROVIDES....................................................3REMEDIES TO MINIMIZE THE DIGITAL FOOTPRINTS.....................................................4References........................................................................................................................................4
INTRODUCTIONThe following paper would discuss the techniques and activities a hacker may perform beforeconducting an attack. A digital footprint can be defined as the trail of digital shadow a personleaves while surfing the internet. It may include the websites, emails and the online interaction ofthe target. the digital footprint can be exploited by the hacker in order to gain additionalknowledge about the target [ CITATION Lyn12 \l 1033 ].The process of understanding the approach of the hacker that would be followed in order toexploit a system can be considered as footprinting the system. Hackers rely on the security flawsin the systems and in order to exploit those weaknesses hackers may build and maintain adatabase that would contain the information of the security exploits of company systems.Footprinting techniques allow the hackers to study these weaknesses prior to an attack and createan action plan that would assist in exploiting the system[ CITATION McG21 \l 1033 ].OBJECTIVES.Some of the main objectives of digital footprinting are to analyze the security flaws of the systemby finding all of the possible loopholes and creating an appropriate action plan, that would helpin gaining access in the targeted company’s system. The process of identifying the potentialvulnerable system can also be done using different tools available to assist the professionals toconduct the process of digital footprinting, and narrow down the possible vulnerabilities on thebasis of their IPs and lack of installed security protocols. After the information regarding thethreats and vulnerabilities is collected, it can be used in order to identify the weaknesses in the

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
SAAD
Tags
IP address, attack, digital footprint

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture