The Role of Open Source Intelligence on the Implementation Of Cyber Attacks
Abstract
In our daily life, the various data and information play a key role, and as a result, their acquisition and efficient use are crucial to solving our daily routine tasks and during the implementation of cyber attacks, since getting the right information is just as essential to do our everyday activities as to initiate a cyber attack. The acquisition of information is an indispensable element of the implementation of cyber attacks and can be interpreted as its first step. The acquisition of information is a good way to get to know the target of the attack, and to explore the various vulnerabilities and risks, as discovering these shortcomings can significantly increase the chance of a successful attack. In addition, several planning, organizational and enforcement activities are associated with the effective implementation of certain sections of cyber attacks, whereby such an attack can be performed much more efficiently, effectively and faster by acquiring, collecting and using relevant information.
This paper reviews the possible tools and forms of open source intelligence and its role played in cyber attacks.