Cyber Security and Open Source Intelligence Techniques

Cyber Security and Open Source Intelligence Techniques

Onurhan Yılmaz (Global Banking Company, Turkey)
DOI: 10.4018/978-1-5225-8976-1.ch003


Open source intelligence (OSINT) is one of the most confrontational topics in cyber security in today's world where technology and data transfer methods are highly developed. It is known that many organizations and individuals use OSINT as an information gathering tool during data transfer over the internet and provide many personal or corporate information access. OSINT is a systematic method that is produced by official and private organizations via sources such as the internet or the media. In recent years there has been some debate about the security and privacy of this information, especially with the widespread use of social media. In this chapter, the control of information obtained by OSINT the security will explain the positive effects on this control mechanism.
Chapter Preview

Cyber Security

The ease brought by the world that is developed and virtualized with technology is a lesser measure. From computers and smart phones to home appliances, everything from cars to cars can be connected via internet. But the biggest challenge this situation has is the safety of this infrastructure to be able to provide. Information and communication systems must be used to protect against cyber threats and cyber attacks in order to be safe in the virtual environment where many personal, institutional and national information is shared.

Cyber security is defined as the name given to the entirety of security concepts, tools, activities, policies and technologies to protect the data of institutions, organizations and individual users in the virtual environment. Cyber security aims to protect the data, institutional and individual users' data, infrastructures, applications and services, electronic communication systems and all data stored in cyberspace against security risks in cyberspace. The purpose of cyber security is to provide accessibility, integrity and confidentiality of information. The threats and attacks that can occur in cyber security layers are shown in Figure 1.

Figure 1.



Accessibility information is when the systems and services are readily available in case of an unexpected error, in an extraordinary state, and in the face of a cyber attack, whenever they are needed. It is very important that the information is accessible in case of a damage to information and communication systems that will occur in other infrastructure systems.

Integrity means that the data is preserved in the system completely and unchanged throughout the entire life cycle.

Confidentiality means that the data stored in the information and communication system is protected from being seized by unauthorized persons. Confidentiality is essential during communication to protect personal privacy. These are listed as interdependent conditions for ensuring safety of the cyber security. In addition to this is another identity authentication. Authentication declared by people verification of credentials. Online shopping and internet banking etc. In systems where credit card information or username and password must be used, the contribution of authentication to security is a measurable measure (Mustafa Ü., Cafer C.,Ayşe Gül M.,).

Every method to be used for the safety of cyber security and the systems to be developed have some considerations. These relevant matters are explained in detail in Table 1.

Table 1.
Things to be considered in cyber security systems
Protection of citizens' rights and freedoms
To do what is necessary to ensure a society with equal rights
Ensuring the involvement of individuals from all walks of life in decisions affecting the country
Careful observance of the rules applied in other countries as much as possible
Taking common steps in this regard with other countries
To calculate and use the benefit to be earned and the loss suffered
Do not use this power to do much damage to the less powerful ones
Observance of the measure principle

Complete Chapter List

Search this Book: