USING OPEN SOURCE INTELLIGENCE (OSINT) AS ONE OF THE EFFECTIVE AND LEGITIMATE WAYS TO AVOID THREATS TO THE CORPORATION
Authors: Oleksii Kuchmai, Tetiana Shelest
Affiliation: Taras Shevchenko National University of Kyiv, 24 B. Gavrilishyna St., Faculty of Information Technology, Kiev, 02000, Ukraine
Category:
Keywords: Cyber Intelligence, OSINT, Cybercrime, Threats, Company, Security
ABSTRACT. Open source intelligence (OSINT) is an intelligence discipline that includes the search, selection and collection of intelligence from publicly available sources, as well as its analysis. In the intelligence community, the term "open information source" refers to the public availability of a source (as opposed to secret and restricted sources), but it is not related to the notion of "just a source of information" (English open source information; OSIF), which means any information in the media space
References:
1.McLaughlin, Michael (June 2012). "Using open source intelligence [https://www.usersearch.org software] for cybersecurity intelligence". ComputerWeekly.com. Archived from the original on 2018-06-29.
2.The US Intelligence Community. ASIN 0813349184.
3.Gagnidze, M. Iavich, G. Iashvili, Some Aspects of Post-Quantum Cryptosystems, Abstract book, EURO-ASIA FORUM IN POLITICS ECONOMICS AND BUSINESS – 2016, JULY 21-22, 2016, BELGRADE, SERBIA.
4."Spy Agencies Turn to Newspapers, NPR, and Wikipedia for Information: The intelligence community is learning to value 'open-source' information". Archived from the original on 2012-04-07. Retrieved 2008-09-15.
5."As defined in Sec. 931 of Public Law 109-163, entitled, "National Defense Authorization Act for Fiscal Year 2006."". Archived from the original on 2008-11-12.
6.Richelson, Jeffrey T (2015-07-14). The U.S. Intelligence Community. Avalon Publishing. ISBN 9780813349190. Retrieved 15 May 2017.
7.George, edited by Roger Z; Kline, Robert D; Lownethal, Mark M (2005). Intelligence and the national security strategist: enduring issues and challenges. Lanham: Rowman and Littlefield. ISBN 9780742540392.
8.Bornn, D Marshall (9 Jan 2013). "Service members, civilians learn to harness power of 'Open Source' information". www.army.mil. Archived from the original on 9 December 2017.
9.Lowenthal, Mark; Clark, Robert (2015). The Five Disciplines of Intelligence Collection. CQ Press. p. 18.
10.(The Commission on the Intelligence Capabilities). Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction
11."Reexamining the Distinction Between Open Information and Secrets – Central Intelligence Agency". www.cia.gov. Archived from the original on 2018-06-08. Retrieved 2018-06-29.
12.Hudnall, Ken (2011). "Intelligence Failures". No Safe Haven: Homeland Insecurity. Grave Distractions Publications. ISBN 9781452493923
13.Kozlenko, M., Lazarovych, I., Tkachuk, V., Vialkova, V. Software Demodulation of Weak Radio Signals using Convolutional Neural Network 2020 IEEE 7th International Conference on Energy Smart Systems, ESS 2020 - Proceedings, 2020, pp. 339–342
14. Zhengbing Hu, Sergiy Gnatyuk, Tetiana Okhrimenko, Sakhybay Tynymbayev, Maksim Iavich, "High-Speed and Secure PRNG for Cryptographic Applications", International Journal of Computer Network and Information Security(IJCNIS), Vol.12, No.3, pp.1-10, 2020. DOI: 10.5815/ijcnis.2020.03.01
15. Zh. Hu, V. Kinzeryavyy, M. Iavich et al., "High-Speed Privacy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits", CEUR Workshop Proceedings, vol. 2393, pp. 810-821.
16.Hubskyi, O., Babenko, T., Myrutenko, L., Oksiiuk, O. Detection of sql injection attack using neural networks //Advances in Intelligent Systems and Computing, 2021, 1265 AISC, pp. 277–286
17.Maksim Iavich, Sergiy Gnatyuk, Giorgi Iashvili, Andriy Fesenko, Cyber security European standards in business, Scientific and practical cyber security journal, 2019
18.Kovalova, Y., Babenko, T., Oksiiuk, O., Myrutenko, L. OPTIMIZATION OF LIFETIME IN WIRELESS MONITORING NETWORKS//International Journal of Computing, 2020, 19(2), pp. 267–272
Menu