| Literature DB >> 35111912 |
Abdallah Qusef1, Hamzeh Alkilani2.
Abstract
The Internet's emergence as a global communication medium has dramatically expanded the volume of content that is freely accessible. Through using this information, open-source intelligence (OSINT) seeks to meet basic intelligence requirements. Although open-source information has historically been synonymous with strategic intelligence, today's consumers range from governments to corporations to everyday people. This paper aimed to describe open-source intelligence and to show how to use a few OSINT resources. In this article, OSINT (a combination of public information, social engineering, open-source information, and internet information) was examined to define the present situation further, and suggestions were made as to what could happen in the future. OSINT is gaining prominence, and its application is spreading into different areas. The primary difficulty with OSINT is separating relevant bits from large volumes of details. Thus, this paper proposed and illustrated three OSINT alternatives, demonstrating their existence and distinguishing characteristics. The solution analysis took the form of a presentation evaluation, during which the usage and effects of selected OSINT solutions were reported and observed. The paper's results demonstrate the breadth and dispersion of OSINT solutions. The mechanism by which OSINT data searches are returned varies greatly between solutions. Combining data from numerous OSINT solutions to produce a detailed summary and interpretation involves work and the use of multiple disjointed solutions, both of which are manual. Visualization of results is anticipated to be a potential theme in the production of OSINT solutions. Individuals' data search and analysis abilities are another trend worth following, whether to optimize the productivity of currently accessible OSINT solutions or to create more advanced OSINT solutions in the future.Entities:
Keywords: Cybercrimes; OSNIT; Open data; Open-source intelligence; Reconnaissance
Year: 2022 PMID: 35111912 PMCID: PMC8771761 DOI: 10.7717/peerj-cs.810
Source DB: PubMed Journal: PeerJ Comput Sci ISSN: 2376-5992
Figure 1Structure of the paper.
Figure 2OSNIT various sources.
Figure 3Various phases of the MITRE ATT&CK cyber kill chain.
OSINT source checklist (taken from Gibson, 2004).
| Checklist | Description |
|---|---|
| Authority | Are the OSINT origins held in high regard by peers or consumers? |
| Accuracy | For reference, how reliable is the OSINT source, and can it be checked or evaluated? |
| Objectivity | Seems to be the OSINT root in some manner distorted? |
| Timely | Is the OSINT root timestamped, date-stamped, or geolocated? |
| Relevancy | How essential is the OSINT element? |
Figure 4Primary uses of open-source Intelligence.
Security controls.
| Data security policies: Establishing great information and rules for cybersecurity in compliance with company needs and relevant laws and regulations. |
| Data protection organization: Creating a framework for facilitating and monitoring the application of cybersecurity. |
| Performance appraisal: Checking that staff and vendors are mindful of and fulfill their cybersecurity obligations before, during, and after work and recognizing their obligations and are fit for the positions for which they are being chosen. |
| Integral gain: describe and specify the necessary protections, for example, the avoidance, alteration, elimination, or loss of information contained in newspapers and any unwanted information. |
| Control monitoring: Ensure that access to information collection and processing facilities is limited and that permitted access to systems and resources is guaranteed and prevented from unauthorized access. |
| Cryptography: checking that cryptographic knowledge is correctly and efficiently used to preserve information security, reliability, and honesty. |
| Environmental and physical safety: Avoiding unwanted entry to the organization's material and informational computing infrastructure, disruption, and conflict. |
| Protection of services: Providing proper and safe information management services activities. |
| Surveillance of information exchange: ensuring network safety and related information management services and ensuring security for information sent within a company and to every external body. |
| Technologies procurement, growth, and servicing: Establishing that computer management is integrated with the lifecycle of information systems. This provision often applies to computer structures that deliver utilities over open networks. |
| Performance framework: Making sure the company resources made accessible to suppliers are secured. |
| Control of computer protection incidents: Providing a transparent and efficient approach to risk management, including correspondence with threat intelligence and vulnerabilities. |
| Components of operational processes relating to digital technology: Integrating cybersecurity continuity into an organization's Business Continuity Management (BCM) processes. |
| Enforcement: Prohibiting violations of civil, constitutional, administrative, or statutory responsibilities and protection provisions relating to information security, including compliance with applicable and compliance issues and conducting cybersecurity assessments. |
ISO/IEC 27001:2013 compliant.
| How: An organization that wishes to enhance its security management framework by adhering to ISO/IEC 27001:2013 will perform the following activities: |
| Gap review: As the first move toward implementation, either internally or with the assistance of an impartial information technology specialist, a gap analysis is conducted. A distance appraisal enables the company to thoroughly comprehend which standards and controls it complies with and which it does not. |
| Regeneration: If a company is not per specific standards or controls, it will improve the personnel, procedures, and technology to become compliant. |
| Definition, Track, and Audit: The success of the ISMS must be continuously analyzed and checked for efficacy and enforcement and to find opportunities to enhance internal procedures and controls. |
| Assessment process: A practical understanding of the lead audit procedure is needed for the ISMS at scheduled intervals and is also critical for champions responsible for adopting and enforcing ISO/IEC 27001:2013 enforcement before performing a certification audit by an external auditor or agency approved to approve and classify an entity as ISO/IEC 27001:2013 compliant. |
| Certified and identity verification: During the Stage One certification audit, the inspector will determine if the report complies with the ISO/IEC 27001:2013 specification and will highlight any areas of non - conformity and future management system change. After incorporating the appropriate adjustments, the company would be eligible for a Stage Two registration check. The auditor would perform a comprehensive evaluation of the organization's conformity with the ISO/IEC 27001:2013 standard during a Stage Two audit. |
Figure 5Research investigation process.
Demographic questions.
| 1. What is the highest level of Education? |
| 2. How many years of forensic experience do you have? |
| 3. In which industry are you currently working? |
| 4. Which role best describes you? |
| 5. Country of your performance? |
| 6. Are you comfortable with social media investigations? |
| 7. Which social media app do you use most frequently? |
| 8. Define OSNIT in one line? |
Respondents’ demographic information (n = 9).
| Participant | Location | Highest tertiary qualification achieved | Industry | Current digital forensics role | Are you comfortable with social media investigations? | Years of digital forensic experience |
|---|---|---|---|---|---|---|
| 1. | Australia | Honor degree | Education | Consulting | Yes | 3–5 years |
| 2. | Kenya | Bachelor’s degree | Finance | Corporate Investigator | Very much | 8–10 years |
| 3. | South Africa | Master’s degree | University | Forensic expert | Extremely high | 10–12 years |
| 4. | New York | Engineering degree | Software agency | Consultant | Neutral | 4–5 years |
| 5. | Britain | Diploma in computers | Government agency | Corporate investigator | Very comfortable | 6–8 years |
| 6. | India | Professional certification | Consultant | Insurance | Neutral | 3–5 years |
| 7. | Singapore | Diploma | College | Computer expert | High | 6–8 years |
| 8. | USA | Bachelor’s degree | Information Technology | Forensic expert | Pretty sure | 4–5 years |
| 9. | Germany | Doctorate’s degree | Law Enforcement | Cybercrime expert | Extremely high | 9–12 years |
Figure 6Analysis of survey questions.
Figure 7Use of search engines.
Figure 8Views about the forensic investigation.
Figure 9Internet sites and social networking.