2022
DOI: 10.1093/cybsec/tyac003
|View full text |Cite
|
Sign up to set email alerts
|

Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure

Abstract: In order to efficiently manage and operate industrial-level production, an increasing number of industrial devices and critical infrastructure (CI) are now connected to the internet, exposed to malicious hackers and cyberterrorists who aim to cause significant damage to institutions and countries. Throughout the various stages of a cyber-attack, Open-source Intelligence (OSINT) tools could gather data from various publicly available platforms, and thus help hackers identify vulnerabilities and develop malware … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…This approach will be adapted to explore how financial institutions can address cybersecurity workforce challenges and leverage diversity to enhance data security. Zhang et al (2022) demonstrate the use of qualitative analysis to identify open-source information that could be exploited in cyberattacks against critical infrastructure. Their work informs our methodology by highlighting the importance of analyzing publicly available data to understand cybersecurity vulnerabilities and threats in the financial sector.…”
Section: Methodology and Analysis Techniquesmentioning
confidence: 99%
“…This approach will be adapted to explore how financial institutions can address cybersecurity workforce challenges and leverage diversity to enhance data security. Zhang et al (2022) demonstrate the use of qualitative analysis to identify open-source information that could be exploited in cyberattacks against critical infrastructure. Their work informs our methodology by highlighting the importance of analyzing publicly available data to understand cybersecurity vulnerabilities and threats in the financial sector.…”
Section: Methodology and Analysis Techniquesmentioning
confidence: 99%