作者
Yong-Woon Hwang, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, Donghyun Kim
发表日期
2022
来源
Wireless Communications and Mobile Computing
卷号
2022
期号
1
页码范围
1290129
出版商
Hindawi
简介
Recently, users have used open‐source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial‐of‐service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If exploited in a negative manner, it is important to prepare countermeasures that can minimize the damage caused by cybercrimes. In this paper, the current status and security trends of OSINT will be explained. Specifically, we present security threats and cybercrimes that may occur if data gathered by OSINT are exploited by …
引用总数
学术搜索中的文章
YW Hwang, IY Lee, H Kim, H Lee, D Kim - Wireless Communications and Mobile Computing, 2022