Evaluation of Google hacking

  • Authors:
  • Justin Billig;Yuri Danilchenko;Charles E. Frank

  • Affiliations:
  • Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY

  • Venue:
  • Proceedings of the 5th annual conference on Information security curriculum development
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Google Hacking uses the Google search engine to locate sensitive information or to find vulnerabilities that may be exploited. This paper evaluates how much effort it takes to get Google Hacking to work and how serious the threat of Google Hacking is. The paper discusses the countermeasures that can be used against Google Hacking.