Results 1 to 10 of about 5,200 (210)

Review OSINT tool for social engineering [PDF]

open access: yesFrontiers in Big Data, 2023
In recent years, we observed an increase in cyber threats, especially social engineering attacks. By social engineering, we mean a set of techniques and tools to collect information about a person or target to extort sensitive information. Such information might be used for (industrial) espionage, to blackmail the user, or represent the starting point ...
Nobili M.
exaly   +5 more sources

The effect of ISO/IEC 27001 standard over open-source intelligence [PDF]

open access: yesPeerJ Computer Science, 2022
The Internet’s emergence as a global communication medium has dramatically expanded the volume of content that is freely accessible. Through using this information, open-source intelligence (OSINT) seeks to meet basic intelligence requirements.
Abdallah Qusef, Hamzeh Alkilani
doaj   +3 more sources

Global Epidemiology of Outbreaks of Unknown Cause Identified by Open-Source Intelligence, 2020–2022 [PDF]

open access: yesEmerging Infectious Diseases
Epidemic surveillance using traditional approaches is dependent on case ascertainment and is delayed. Open-source intelligence (OSINT)–based syndromic surveillance can overcome limitations of delayed surveillance and poor case ascertainment, providing ...
Damian Honeyman   +9 more
doaj   +2 more sources

Shining a light on AIS Blackouts with maritime OSINT

open access: yesFrontiers in Computer Science, 2023
Maritime open source intelligence (maritime OSINT) can be used to capture information, critical to business operations, including when electronic systems like Automatic Identification Systems (AIS) fail.
Emerald Cara Sage
exaly   +3 more sources

OSINT

open access: yes
A cibersegurança tem vindo a atrair cada vez mais as atenções devido ao crescimento contínuo do número e da gravidade dos ataques efectuados. Para proteger eficazmente um sistema informático é necessário receber continuamente notícias e eventos relacionadas com cibersegurança, incluíndos novas vulnerabilidades e ataques.
Atif Ali, Baber Majid Bhatti
exaly   +4 more sources

Leveraging OSINT for Advanced Proactive Cybersecurity: Strategies and Solutions

open access: yesIEEE Access
The growing complexity of the digital environment has increased the need for proactive and intelligence-based approaches to cybersecurity. This study examines the role of open-source intelligence (OSINT) as a strategic tool in proactive cybersecurity ...
Moti Zwilling, Chen Hajaj
exaly   +3 more sources

The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends

open access: yesIEEE Access, 2020
The amount of data generated by the current interconnected world is immeasurable, and a large part of such data is publicly available, which means that it is accessible by any user, at any time, from anywhere in the Internet. In this respect, Open Source
Javier Pastor-Galindo   +2 more
exaly   +3 more sources

A szürke OSINT gyanús?

open access: yesBelügyi Szemle
Cél: A tanulmány célja az OSINT, vagyis a nyílt forrású hírszerzés egyes vitatottabb információgyűjtő eljárásainak vizsgálata büntetőjogi megközelítésből. Módszertan: A tanulmány több kutatási módszer párhuzamos alkalmazásán alapszik. Több tudományág
István Solti
doaj   +2 more sources

Адміністративно-правове регулювання забезпечення функціонування OSINT у сфері національної безпеки

open access: yesАналітично-порівняльне правознавство, 2023
Стаття присвячена дослідженню адміністра­тивно-правового регулювання забезпечення функціонування OSINT у сфері національної без­пеки. У статті звертається увага на те, що дослі­дження такого складного і важливого явища, як забезпечення функціонування ...
S. Martyniuk
doaj   +1 more source

Home - About - Disclaimer - Privacy