Dimension 1: People Reconnaissance 1. Find a LinkedIn profile of a fictional person named "Jordan Harris" who works as a "cybersecurity analyst". Provide a snapshot of your find and the link. ⚫ Suggested tools: LinkedIn, Google search. 2. Identify whether an email address like john.doe@example.com has been part of a known data breach. Use your e-mail addresses and see if you have been exposed in any areas. Provide a snapshot of the results. ⚫ Suggested tool: Have I Been Pwned B. 3. Locate a public resume for someone in the IT field with experience in Python. Provide a snapshot of the resume and the link. ⚫ Suggested tools: Google Dorking (e.g., filetype:pdf "Python developer resume"). 4. Find the social media profile of a public figure or celebrity. Provide a snapshot of the find and the link. ф Suggested tools: Facebook, Twitter/X, Instagram search. 5. Search for a public mugshot or wanted poster of members wanted for cybercrimes by the federal government. There is actually a $10 million reward for these members. Provide a snapshot of the results and the link. ° Suggested tools: Local law enforcement websites, public records search engines.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter11: Security Maintenance
Section: Chapter Questions
Problem 4E
Question
Dimension 1: People Reconnaissance
1. Find a LinkedIn profile of a fictional person named "Jordan Harris" who works as a "cybersecurity analyst".
Provide a snapshot of your find and the link.
⚫ Suggested tools: LinkedIn, Google search.
2. Identify whether an email address like john.doe@example.com has been part of a known data breach. Use
your e-mail addresses and see if you have been exposed in any areas. Provide a snapshot of the results.
⚫ Suggested tool: Have I Been Pwned B.
3. Locate a public resume for someone in the IT field with experience in Python. Provide a snapshot of the
resume and the link.
⚫ Suggested tools: Google Dorking (e.g., filetype:pdf "Python developer resume").
4. Find the social media profile of a public figure or celebrity. Provide a snapshot of the find and the link.
ф
Suggested tools: Facebook, Twitter/X, Instagram search.
5. Search for a public mugshot or wanted poster of members wanted for cybercrimes by the federal
government. There is actually a $10 million reward for these members. Provide a snapshot of the results and
the link.
°
Suggested tools: Local law enforcement websites, public records search engines.
Transcribed Image Text:Dimension 1: People Reconnaissance 1. Find a LinkedIn profile of a fictional person named "Jordan Harris" who works as a "cybersecurity analyst". Provide a snapshot of your find and the link. ⚫ Suggested tools: LinkedIn, Google search. 2. Identify whether an email address like john.doe@example.com has been part of a known data breach. Use your e-mail addresses and see if you have been exposed in any areas. Provide a snapshot of the results. ⚫ Suggested tool: Have I Been Pwned B. 3. Locate a public resume for someone in the IT field with experience in Python. Provide a snapshot of the resume and the link. ⚫ Suggested tools: Google Dorking (e.g., filetype:pdf "Python developer resume"). 4. Find the social media profile of a public figure or celebrity. Provide a snapshot of the find and the link. ф Suggested tools: Facebook, Twitter/X, Instagram search. 5. Search for a public mugshot or wanted poster of members wanted for cybercrimes by the federal government. There is actually a $10 million reward for these members. Provide a snapshot of the results and the link. ° Suggested tools: Local law enforcement websites, public records search engines.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm…
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
A+ Guide To It Technical Support
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,