Reference no: EM133459199
Case Study: There are distinct groups of hackers; however, the membership between groups is fluid. There are two ways commonly used to categorise them: The first is the simplest - W/B Hat model. The second is based loosely on psychological profiling and is a more complicated and more useful way to understand the motivations of hackers.
Questions:
Discuss three Hat categories with examples including their motivations and goals.
Describe two hacker profiles.
Explain "love for puzzles" as a motivation for hackers.
List four hackers' motivations.
What is the problem with using bandwidth without permission?
What are the issues with copying, downloading, and using proprietary software and other copyrighted works?
Reconnaissance
Reconnaissance is the act of locating targets and developing the methods necessary to attack those targets successfully.
Define reconnaissance. List three classifications of reconnaissance.
Describe two legal reconnaissance activities with examples.
Describe two illegal reconnaissance activities with examples.
Describe conformity as a social engineering technique.
Describe Web Searching as a Internet footprinting technique.
What is the importance of proper discarding of refuse?
List four important sources of authorised/unauthorised information a hacker may collect.
List three methods and tactics of social engineering.
Briefly describe two methods in dumpster diving and discuss the tactics that are used.
List the four methods available in Internet footprinting and tactics and techniques involved in each method.