Cyber Security and Open Source Intelligence Techniques

Author(s):  
Onurhan Yılmaz

Open source intelligence (OSINT) is one of the most confrontational topics in cyber security in today's world where technology and data transfer methods are highly developed. It is known that many organizations and individuals use OSINT as an information gathering tool during data transfer over the internet and provide many personal or corporate information access. OSINT is a systematic method that is produced by official and private organizations via sources such as the internet or the media. In recent years there has been some debate about the security and privacy of this information, especially with the widespread use of social media. In this chapter, the control of information obtained by OSINT the security will explain the positive effects on this control mechanism.

Author(s):  
Xichen Zhang ◽  
Ali A. Ghorbani

Over recent years, the extensive development of information technology has dramatically advanced the way that people use the internet. The fast growth of the internet of things and mobile crowdsensing applications raise challenging security and privacy issues for the society. More often than before, malicious attackers exploit human vulnerability as the weakest link to launch cyberattacks and conduct fraudulent online activities. How to profile users' daily behavior becomes an essential component for identifying users' vulnerable/malicious level and predicting the potential cyber threats. In this chapter, the authors discuss human factors and their related issues in cyber security and privacy. Three categories of human behaviors—desktop behavior, mobile behavior, and online behavior—and their corresponding security and privacy issues are demonstrated in detail to estimate the vulnerabilities of internet users. Some future directions related to human-factor based security and privacy issues are proposed at the end of this chapter.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 196
Author(s):  
R Vignesh ◽  
K Rohini

This paper analyzes a variety of Challenging Roles of Ethical Hacking employed in Cyber Security. The requirement for more viable requesting data security rehearses is progressively evident with every security encroaches revealed in the media. Ethical hacking set forward a target investigation of an association's data security bearing for associations of numerous phase of security capability. Programmers must output for shortcomings, test section focuses, needs targets, and build up a procedure that best use their assets. The reason for this sort of security appraisal directly affects the estimation of the entire assessment. More finished it is recognized that electronic devices are fundamental to forestall digital culprits hacking into online systems to contain their administrations and access secret information for uncalled for purposes. Ethical Hacking is capably required where approved programmers endeavor to penetrate a business' frameworks/arranges for the benefit of the proprietors with the goal of discovering security shortcomings. It give bits of knowledge into how Ethical Hacking, as Penetration Testing utilizing free open source devices, can be utilized by associations to secure their system's administrations/activities. Utilizing Nmap, Google Hacking, Nessus, Brutus and Acunetix .Thus measures were placed in to determine these vulnerabilities and dodge the delicate information from potential digital threats.  


Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


2018 ◽  
pp. 1553-1584
Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


Author(s):  
Michael A. Goedeker

New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence. One of the many disturbing consequences of this is that we are faced with attackers that are versed in stealth, deception, planting false information, and increased training in newer attack technologies that classical tools can no longer reliably find. In addition, advanced attack and deception skills now use OSINT (open source intelligence) data collection tactics that have moved entire attack chains into the espionage and surveillance realm.


2019 ◽  
Vol 2019 (54) ◽  
pp. 116-134
Author(s):  
Magdalena Tomaszewska-Michalak

Article deals with legal possibilities of obtaining information on the Internet. It indicates methods of obtaining information legally (such as open source intelligence) and methods recognized in Polish law as unlawful (such as activities aimed at disrupting the operation of an IT system). The article also discusses the issues of phishing, the use of false identity in the Internet (so-called sock puppetry), as well as the information potential of metadata analysis.


2018 ◽  
Vol 10 (11) ◽  
pp. 105 ◽  
Author(s):  
YangQun Li

The Internet of Things (IoT) is increasingly part of daily life. However, the development of IoT applications still faces many problems, such as heterogeneity, complex management, and other difficulties. In this paper, first, the open source technologies of IoT are surveyed. We compare these technologies from the point of view of different levels of technical requirements, such as device management, data management, communication, intelligent data processing, security and privacy protection; we also look at requirements of application development and deployment. Second, an IoT integrated development platform architecture for IoT applications based on open source ecosystem is proposed and evaluated in an industrial setting. We applied P2P technology to distributed resource management and blockchain-based smart contract mechanics for resource billing management. The results show that the IoT gateway based on an open source ecosystem had a stable and reliable system performance with a certain data size and concurrency scale. These conditions satisfy the application requirements of the IoT in most sensing environments.


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 2926
Author(s):  
Rizwan Majeed ◽  
Nurul Azma Abdullah ◽  
Muhammad Faheem Mushtaq ◽  
Muhammad Umer ◽  
Michele Nappi

Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provide a safe and secure network to acquire desired performance. Small drones are finding new paths for progress in the civil and defense industries, but also posing new challenges for security and privacy as well. The basic design of the small drone requires a modification in its data transformation and data privacy mechanisms, and it is not yet fulfilling domain requirements. This paper aims to investigate recent privacy and security trends that are affecting the Internet of Drones (IoD). This study also highlights the need for a safe and secure drone network that is free from interceptions and intrusions. The proposed framework mitigates the cyber security threats by employing intelligent machine learning models in the design of IoT-aided drones by making them secure and adaptable. Finally, the proposed model is evaluated on a benchmark dataset and shows robust results.


2019 ◽  
pp. 1666-1696
Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Dustin Bessette

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and human-centered issues in security design.


Sign in / Sign up

Export Citation Format

Share Document