please I have attached 4 document

All discussion from week 1-5 to give an idea to what we discused

Discusion:1

DQ1: How does OSINT contribute to the overall security picture?

DQ2: What is a collection plan? Why would an organization/you need one?


Discussion 2

DQ1: Why is the screening process so integral to the overall interrogation process?  

DQ2: How would you adapt this process for cybersecurity work?


Discussion 3

What is a Google dork? What is it used in? Is it helpful for hacking?


Discussion 4

DQ1: You want to use Google dorks to footprint the site but only want results that show file extensions, what Google dork operators would you use, and why?


Discussion 5

What are some common pitfalls of intelligence analysis, and how can you avoid them?


I will also submit some paper from assignment we did through the semester to give an idea. This for assignment 2

Als I will attached my organization