Current Status and Security Trend of OSINT
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, Yong-Woon | - |
dc.contributor.author | Lee, Im-Yeong | - |
dc.contributor.author | Kim, Hwankuk | - |
dc.contributor.author | Lee, Hyejung | - |
dc.contributor.author | Kim, Donghyun | - |
dc.date.accessioned | 2022-04-14T05:40:24Z | - |
dc.date.available | 2022-04-14T05:40:24Z | - |
dc.date.issued | 2022-02-18 | - |
dc.identifier.issn | 1530-8669 | - |
dc.identifier.issn | 1530-8677 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/20644 | - |
dc.description.abstract | Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If exploited in a negative manner, it is important to prepare countermeasures that can minimize the damage caused by cybercrimes. In this paper, the current status and security trends of OSINT will be explained. Specifically, we present security threats and cybercrimes that may occur if data gathered by OSINT are exploited by malicious users. Furthermore, to solve this problem, we propose security requirements that can be applied to the OSINT environment. The proposed security requirements are necessary for securely gathering and storing data in the OSINT environment and for securely accessing and using the data collected by OSINT. The goal of the proposed security requirements is to minimize the damage when cybercrimes occur in the OSINT environment. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | John Wiley & Sons Inc. | - |
dc.title | Current Status and Security Trend of OSINT | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1155/2022/1290129 | - |
dc.identifier.scopusid | 2-s2.0-85125743989 | - |
dc.identifier.wosid | 000772465700004 | - |
dc.identifier.bibliographicCitation | Wireless Communications and Mobile Computing, v.2022, no.., pp 1 - 14 | - |
dc.citation.title | Wireless Communications and Mobile Computing | - |
dc.citation.volume | 2022 | - |
dc.citation.number | . | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 14 | - |
dc.type.docType | Review | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | OPEN-SOURCE INTELLIGENCE | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordPlus | AUTHENTICATION | - |
dc.subject.keywordPlus | CHALLENGES | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | PRIVACY | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.