Skip to main content

About this Research Topic

Manuscript Submission Deadline 20 January 2023
Manuscript Extension Submission Deadline 31 August 2023

Open Source Intelligence (OSINT) has been used throughout history to determine threats to organizations, and people, while offering opportunities. In terms of cybersecurity, OSINT has been utilized by adversaries who wish to gain knowledge about people and organizations so as to perpetrate cyber-attacks on ...

Open Source Intelligence (OSINT) has been used throughout history to determine threats to organizations, and people, while offering opportunities. In terms of cybersecurity, OSINT has been utilized by adversaries who wish to gain knowledge about people and organizations so as to perpetrate cyber-attacks on computer networks. Some governments have even supported these cyber-attacks, which have often been facilitated by OSINT. Critical infrastructure, including the financial, healthcare, and energy sectors, face even greater threats from cyber-attacks, facilitated by the proliferation of more interconnected networks and the sheer volume of big data.

Conversely, there are also opportunities for companies to use OSINT to identify threats to their organizations and improve their cybersecurity posture. Companies have become more reliant on OSINT, such as social media and the Dark Web to recognize threats. Moreover, organizational threat intelligence today maintains an even greater reliance on OSINT and big data to discover stolen or leaked information, such as corporate financial data, intellectual property, and stolen credentials. It is therefore critical for organizations to develop their OSINT capabilities and integrate these activities into their cybersecurity tactics and strategies. OSINT has become even more imperative for critical infrastructure, where cybersecurity resources may be limited, information technology may be outdated, and the threat of disaster is greater than ever as cyber-attacks continue in this domain. The Research Topic aims to tackle these issues and initiate research and discussion on OISNT threats and opportunities for cybersecurity.

This article collection focuses on the following topics but is not limited to:

• Social media investigations for threat intelligence

• Conducting a risk assessment for critical infrastructure

• Dark Web investigations to identify organizational threats

• Using OSINT for Supervisory control and data acquisition (SCADA)

• Using Big Data from open source for network security

• Threats posed by OSINT to the financial, healthcare, and energy sectors

• Using OSINT to strengthen network and organizational security

• Trends in the classification of OSINT in cybersecurity

• Privacy issues related to the use of OSINT in organizational security

• The use of OSINT in cybersecurity planning, risk assessment, compliance and ethics

Keywords: Big Data, OSINT, critical infrastructure, SCADA, social media, cybersecurity


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

Topic Editors

Loading..

Topic Coordinators

Loading..

Recent Articles

Loading..

Articles

Sort by:

Loading..

Authors

Loading..

total views

total views article views downloads topic views

}
 
Top countries
Top referring sites
Loading..

About Frontiers Research Topics

With their unique mixes of varied contributions from Original Research to Review Articles, Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author.