Sample – Internet Footprint Intelligence Review
November 7, 2009Purpose
Scouting and scavenged information from a Network and Internet presence that can be analyzed as business intelligence.
Objective
Size and scope of the Internet presence
Task
- A measurement of the security policy to future network plans
- Tasks to perform for a thorough Competitive Intelligence Scouting
- Map and measure the directory structure of the web servers
- Map the measure the directory structure of the FTP servers
- Examine the WHOIS database for business services relating to registered host names
- Determine the IT cost of the Internet infrastructure based on OS, Applications, and Hardware.
- Determine the cost of support infrastructure based on regional salary requirements for.
- IT professionals, job postings, number of personnel, published resumes, and responsibilities
- Measure the buzz (feedback) of the organization based on newsgroups, web boards, and industry feedback sites
- Record the number of products being sold electronically (for download)
- Record the number of products found in P2P sources, wares sites, available cracks
Purpose
Privacy Review
Objective
The privacy review is the focal point of the legal and ethical storage, transmission, and control of data based on employee and customer privacy.
The use of this data is a concern to many private persons and legislation is unveiling specific rules regarding privacy.
Although some of these laws are local, all of them apply to the Internet and therefore affect security testers internationally.
Expected Results
List any disclosures
List compliance failures between public policy and actual practice
Outcomes
- List systems involved in data gathering.
- Compare publicly accessible policy to actual practice
- List data gathering techniques.
- Compare actual practice to regional fraud and privacy laws or compliancy
- List data gathered.
- Identify database type and size for storing data
- Tasks to perform for a thorough Privacy Policy review.
- Identify data collected by the organization
- Compare publicly accessible policy to actual practice.
- Identify storage location of data
- Compare actual practice to regional fraud and privacy laws or compliancy.
- Identify cookie types
- Identify database type and size for storing data.
- Identify cookie expiration times
- Identify data collected by the organization.
- Identify information stored in cookie
- Identify storage location of data.
- Verify cookie encryption methods
- Identify cookie types.
- Identify server location of web bug(s)
Identify cookie expiration times. - Identify web bug data gathered and returned to server
- Identify information stored in cookie
- Verify cookie encryption methods
- Identify server location of web bug(s)
- Identify web bug data gathered and returned to server
www.bestitdocuments.com