Ticker

6/recent/ticker-posts

Click Here

Information Gathering | It's source, purpose, requirements and techinques | Quicky Tech

Information Gathering

Information Gathering is the act of accumulating different kinds of information against the targeted victim or system. There are sundry implements, techniques, and websites, including public sources such as Whois, nslookup that can avail hackers amass information.



 Information gathering refers to collection of information from various sources and then compiling that data in the required format. Information Gathering is the act of accumulating different kinds of information against the targeted victim or system. It is the first step or the commencement stage of Ethical Hacking, where the perforation testers or hackers (both ebony hat or white hat) performed this stage; this is an indispensable and crucial step to be performed. 
The more the information gathered about the target, the more the probability to obtain germane results. Information g is not just a phase of security testing; it is an art that every perforation-tester (pen-tester) and hacker should master for a better experience in perforation testing. There are sundry implements, techniques, and websites, including public sources such as Whois, nslookup that can avail hackers amass information. This step is obligatory because you may need any information (such as his pet designation, best friend's denomination, age, or phone number to perform password conjecturing attack or other kinds of attacks) while performing attacks on any target.


In most of the organizations, information gathering refers to collection of large amount of data from various sources. This data is further analyzed to solve a particular problem or situation. However, in specialized industries like air force, military etc., information gathering is a special skill that requires training and education of people involved. This training is based on methods and sources of gathering information.

SOURCES USED IN INFORMATION GATHERING

Research is the accumulation, collation, analysis and evaluation of data. There are diverse sources from which data may be amassed.

A variety of sources maybe utilized for the information amassing spontaneously. These can include primary sources as well as secondary resources. The former is much more practical and appreciated as it yarely available.




Generally, source used in information gathering are of two different types:

  • Existing source.
  • Natural source.

  1. Existing source: it refers to those sources of information that can be found on internet or some other social media and thus information can be easily retrieved and used.
  2.  Natural Sources: It refers to those sources of information which exist in the market but one has to do a lot of research to compile this information. Eg. Information regarding some product, people who have already tried that product, their experiences, feedback etc.
There are, however, many other sources of information which should not be overlooked. Such sources include: the cyber world, newspapers, journals, transcripts from radio or TV programmes, leaflets, photographs and other artefacts (man-made objects).

PURPOSE OF INFORMATION GATHERING:

The purpose of the collection of information in order to improve the organization and to strengthen your organisation, to ensure that it is fully open. ... In addition, it is important to visually explore the views of stakeholders in the subjective data, including reviews from customers, prospective customers, employees, members, donors, etc.).



Researchers are keen to gather information on various topics for the following reasons:

  • Enhance knowledge related to a particular subject.
  • Develop various skills for problem solving.

The purport of information amassing is to fortify the orchestrating of your organization's work to become more plenarily inclusive. It is paramount to visually examine available facts -- objective information, including demographics and best practices.  The topics below will guide you through the information-amassing process.


REQUIREMENTS OF GATHERING TECHNIQUES:

The techniques describe how the tasks are to be carried out in a particular situation. A task may be any one or more of its methods. The technique should be associated with the at least one task. 

Some of the well-known methods of data collection are listed below


Brainstorming Technique

  •  Idea generation. 
  • Idea reduction and voting.

Mind Mapping Technique

  • Use emphasis. 
  • Use association. 
  • Be clear.
  • Layout.

Use Case Workshop Technique

  • Most popular.
  • Collect requirements in step-by-step manner.
  • Helps understanding the details.
  • Easy to document and written in natural language.


Techniques describe how tasks are performed under categorical circumstances. A task may have none or one or more cognate techniques. A technique should be cognate to at least one task.

TECHNIQUES OF INFORMATION GATHERING :



The techniques of information gathering are as under: 

  • Analysis is done to understand business functions and requirements.
  • Model of the existing system is created and changes are suggested as per requirements.
  • Logical explanations and discussions are carried out to implement suggested changes.
  • Balance is maintained between current system and required new system. 
  • Final design is created as per customer's requirement.
Amassing information is the first step where a hacker endeavors to get information about the target. Hackers use different sources and implements to get more information, and some of them are briefly explicated here. This informations will be utilizable for you to become an ethical hacker.

If you got to know anything from this article. So you can like this article.

 And if you find anything bad in this article. Or do you want to improve anything in this article. You comment in the comment box of this article. So that we can improve our upcoming articles. To visit the Website at last Thanks. 

Thanks You again for Visiting our Website. Please Visit Again.

                       

Post a Comment

1 Comments