Write about a bureaucratic model of the organization? Can you identify personnel who work at the entity?

Continue your open source research on your CIKR entity, but now take the point of view of the attacker.
Build a target model based on the readings in Lewis and in Clark. How many models can you make? E.g. what does the cooperative relationships model look like? Does your CIKR entity interface with other organizations?
What about a bureaucratic model of the organization? Can you identify personnel who work at the entity? Can you find contact information online associated with them?
Can you learn what kind of devices they use? Can you find IP addresses and DNS records for their organization?
Based on this new information, what kind of attack would you launch against the target?


Posted

in

by

Tags: