Reference no: EM134002425 , Length: Word Count:2000
Assessment - Self-Reconnaissance and Digital Footprint Analysis
Critically analyse typologies of hackers, their mindsets and the motivations behind hacking.
Critically analyse the various tactics that hackers use in breaching communication networks.
Deconstruct and critically analyze the profit models, value chain, and standard business security practices from the viewpoint of a hacker.
Assessment overview
This assessment requires students to investigate their own online presence from an attacker's perspective using Open-Source Intelligence (OSINT) techniques. The purpose of this task is to help students understand how publicly and privately available information can be collected and potentially exploited for identity theft, social engineering, or other cyberattacks.
You will analyse the information they share online and evaluate how a malicious actor might use that information to compromise them, their friends, family, or colleagues.
This activity is designed to develop awareness of digital footprints, privacy risks, and reconnaissance techniques used in cybersecurity attacks. No AI shortcuts — Get genuine assignment help from experienced, real tutors.
Generative AI use: Please note that generative AI tools are not permitted for this assessment task. You must not use any artificial intelligence to generate materials or content related to this task.
Instructions
In this task, you are required to submit a Report. Your report should cover the following areas: Assessment Components
Students must complete three components:
Public & Private Profile
Resource List
Profile Analysis
Failure to submit the hurdle requirements will result in the assessment being incomplete.
Citation style: APA.
if your submission does not generate a similarity score, it cannot be checked for plagiarism and therefore will not be marked.
Word count: 2000 words