A threat actor is looking at the IT and technical job postings of a target organization. What would be the most beneficial information to capture from these postings?
- the type of hardware and software used
- the salaries of the positions listed
- the hours of work required by the roles listed
- the employment benefits offered by the company
Explanation & Hint: When advertising vacant IT and technical positions, businesses will typically list the hardware and software skills and qualifications required by the successful applicants. This information provides the attacker with helpful information about the hardware and software platforms operated by that business, which can then be used in planning an attack.
|