How vulnerable are you to identity theft? How much of what you freely share through social media and other channels, might be used against you, your friends, family or coworkers?
This assignment involves investigating yourself from an outsider’s point of view, and hacking yourself to build as comprehensive a profile as possible. The aim of this assignment is not to assess which students have the most publicly available information, but to get you thinking on the possible ways a hacker may exploit any type and amount of information available.
At the end of this assignment, you will be required to submit:
- Public & private profile (hurdle)
- Resource list (hurdle)
- Profile analysis (100%)
[Add the link to the rubric or marking guide students will be referring to.]
You will be required to submit a profile of yourself, which should be a minimum of one page in length. For privacy purposes, it is essential you take note of the following points before submitting your profile:
- The only fields of information in your profile should be those publicly available by someone not in your circle of connections
- Apart from your full name, provide only the fields, do not include the actual sensitive information
- John Smith
- One alias
- Date and month of birth
- Two email addresses
- Eight identifiable photographs
- While the suggested approach is outlined below, you do not have to restrict your research to the method described.
- Clear your entire browsing history (show me how (Links to an external site.))
- Ensure you are signed out of all your accounts (social media, web mail, etc.)
- Open a private browser (show me how (Links to an external site.))
- Begin with a simple Google search, and ensure you search for all variations of your name.
- Browse the results obtained through all search functions (i.e., images, videos, news, etc.)
- Expand your search to other search engines.
- Find out as much personal information about you which is publicly i.e., Email addresses, phone numbers, your ID’s, Your birthplace and family details)
- Ensure you are signed in on all social media platforms you have an account with. Most social media platforms have the option to view your profile as a member of your network.
- Alternatively, you may enlist the help of a friend or family member to view your profiles through the eyes of your social network.
- Explore the different variations and the various extents of your profile that are visible to different connections. For example, depending on your privacy settings, someone who shares mutual connections with you may be able to view more sections of your profile as compared to someone with no mutual friends or interests.
- Resource list (Hurdle)
The list of resources used in your research process may include names of search engines, number of social media platforms, and/or any other resources that you may have utilised.
- Profile analysis (100%)
You will be required to submit your assessment that analysis on the vulnerabilities of your profile. The following must be included in your analysis, but you need not restrict yourself to these.
- Comparison of the extent of information available via your public and private profile.
- How a hacker may exploit:
- Publicly available information
- The relationship between the close connection and the subject to gain access to private information
- Private information
- Discussion on the possible motivations and implications of each of the above exploits