Copyright Goodheart-Willcox Co., Inc. 56 Principles of Cybersecurity Quick Look 2.2.6 Advanced Internet Search Advanced Internet searches can be useful in refi ning the results to more closely match the information being sought. Hackers may also use advanced Internet searches to gather information about potential victims. 1. Launch a web browser, and navigate to the Google website (www.google.com). 2. In the search box, enter cyber hacks 2014..2015, and press the [Enter] key to conduct the search. Google looks for information on hacks that occurred in the years 2014 and 2015. 3. Conduct a new search by entering filetype:pdf “computer hackers”. This search looks for any PDF fi le that contains the phrase computer hackers. 4. Conduct a new search by entering allintitle:computer hackers. This command ensures the words computer and hackers appears in the title of the search results. Notice, however, that the words can appear in any order and do not even need to be next to each other in the title. 5. Conduct a new search by entering cache:http://lifehacker.com. The result is not a search, but rather a cached version of the website is displayed. A cached version is a saved version, which may not be the most current version. Dumpster Diving Have you ever watched an old movie where students sneak into a teacher’s offi ce or workroom looking through the trash to fi nd carbon copies of an upcom- ing test? Dumpster diving is digging through trash for useful information. Steal- ing information from trash is not a new technique. It can still be used to gain valuable information to commit a hack. Business documents could reveal contacts, such as vendors or partners. Drafts of projects often end up in the trash. Old or unneeded business cards and other seemingly innocent information may be simi- larly discarded. To help protect against dumpster diving, shred documents when they are no longer needed. Confi dential papers or any other papers that could reveal sensitive information should be shredded. There are generally three types of cuts made to the paper with shredders, as shown in Figure 2-16. The type selected depends on the level of protection needed. • Strip-cut shredders slice the paper into long strips. • Crosscut shredders slice the paper into short strips. • Micro-cut shredders slice the paper into small bits similar to confetti provides the most secure shredding. CompTIA Security+ 1.2 MTA Security Fundamentals 1.2 In the movie Argo, the Iranians successfully reassembled strip-cut shredded documents to gain information. This was accurate they used the term carpet weavers to describe the individuals who reassembled the paper strips. FYI searching for information on car hacking, but only from 2015 through 2016. This can also be used to limit searches to a specifi c year. For example, cybersecurity 2015..2015 will display results only from the year 2015. A search can be limited to a specifi c fi le type. For example, the fi le type for a Microsoft Excel spreadsheet is XLS or XLSX. To limit a search to only the XLS fi le type, enter filetype:xls and a keyword into Google. To search for an Excel fi le that contains the word password, enter filetype:xls password into Google. Since there are two native fi le formats for Excel, you may want to do this search twice, once for each fi le type.