Technical Aspects of Computer Security (D01)
u • mission ypes Discussion Comment
Submission & Rubric
Description
After reviewing the information in the Learn section for this Module: Week, discuss all of the following:
• What are best practices in technical techniques to detect and limit wireless network footprinting? • What are best practices in technical techniques to detect and limit web services footprinting? • What are the methods to leverage social engineering outcomes to technical wireless and web hacking methods? • Provide a Christian worldview perspective on why to defend against web service hacking.