THE THREATS OF OSINT TOOLS AND WAYS TO MITIGATE THE CONSEQUENCES OF THEIR APPLICATION FOR THE ORGANIZATION
DOI:
https://doi.org/10.28925/2663-4023.2024.25.294303Keywords:
social engineering, OSINT, threat intelligenceAbstract
This article examines strategies aimed to mitigate the negative effects of cyberattacks through the use of open-source intelligence (OSINT) tools. Accepting the fact that it is impossible to completely prevent the collection of data about organizations through a significant number of information sources, including open sources (media, news, forums, social media and almost everything published on the Internet), organizations need to be prepared to prevent or counteract the consequences of using this information with malicious intent. A key element of this readiness is to focus on proper staff training and awareness-raising initiatives that include both rules for handling information, such as what information should not be posted on social media, shared with colleagues in verbal conversations or correspondence, and an overview of modern social engineering tactics that use publicly available information to manipulate the organization's employees. The organization's management should also ensure the creation of reliable internal communication channels dedicated to information security issues. In addition, the article emphasizes the importance of monitoring the information space as a proactive measure aimed at countering potential cyber threats. In addition, the benefits associated with the implementation of network segmentation and effective management of user rights, such as the Principe of least privilege (PoLP) – the principle of providing access to resources, where each process, user or program should have access only to the information and resources that are minimally necessary for the successful completion of their work tasks, within the organization were investigated. The mentioned aspects should be considered in a comprehensive manner, which will ensure a multifaceted approach to ensuring the organization's resilience in the face of constantly evolving cyber threats.
Downloads
References
Meyers J. (2018). Training Security Professionals in Social Engineering with OSINT and Sieve. All Theses and Dissertations. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7863&context=etd
Tabatabaei, F., & Wells, D. (2016). OSINT in the Context of Cyber-Security. Open Source Intelligence Investigation. Advanced Sciences and Technologies for Security Applications. https://doi.org/10.1007/978-3-319-47671-1_14
Yamin M., Ullah M., Ullah H., Katt B., Hijji M., & Muhammad K. (2022). Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security. Mathematics, 10(12):2054. https://doi.org/10.3390/math10122054
Weber, J. (2023). Is OSINT legal? The legal and ethical concerns of using open-source intelligence. https://corma-investigations.com/uncategorized/is-osint-legal-the-legal-and-ethical-concerns-of-using-open-source-intelligence/
Molfar. (n. d.). From Public Data to Deep Web: Advanced OSINT Techniques Revealed. https://molfar.com/en/blog/top-osint-techniques
Moreau, P. (2024). The Crucial Role of HR in Communicating with Employees After a Cyber Attack. https://www.linkedin.com/pulse/crucial-role-hr-communicating-employees-after-cyber-dr-phyllis-rgs9c?trk=public_post_main-feed-card_feed-article-content
Gray, J. (2021). Practical Social Engineering. A Primer for the Ethical Hacker.
Flynt, R. (2024). Open-Source Intelligence (OSINT) for Business: Gaining a Competitive Edge. https://www.linkedin.com/pulse/open-source-intelligence-osint-business-gaining-edge-robert-flynt-93llf
Kambic, D., & Fricke, J. (2020). Network Segmentation: Concepts and Practices. Carnegie Mellon University, Software Engineering Institute’s Insights (blog). https://doi.org/10.1184/R1/13118312.v1
Nate Lord. What is the Principle of Least Privilege (POLP)? (2023). https://www.digitalguardian.com/blog/what-principle-least-privilege-polp-best-practice-information-security-and-compliance
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Світлана Легомінова, Юрій Щавінський, Дмитро Рабчун, Михайло Запорожченко, Олександр Будзинський
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.