Osint Explained - PowerPoint PPT Presentation

About This Presentation
Title:

Osint Explained

Description:

Analyze and Predict Threats – PowerPoint PPT presentation

Number of Views:260
Slides: 7
Provided by: CobinWeb
Category:

less

Transcript and Presenter's Notes

Title: Osint Explained


1
OSINT Explained
  • With websites giving rise to an unprecedented
    volume of intelligence for security agencies,
    open-source intelligence, or OSINT, is a treasure
    trove of information for those working to solve
    criminal cases online.

2
OSINT Explained
  • Criminals and terrorists with easy access
    to the vast data sources available on the various
    levels of the web can plan and execute attacks
    against innocent civilians. Security agencies who
    are working to prevent the next crime or attack
    must use all available means to gather targeted
    intelligence.

3
OSINT Explained
  • Over the last decade, there has been an
    increase in the drive to adopt intelligence-led
    approaches and solutions in order to deal with
    threats based on the understanding that
    individuals and illicit networks can be
    identified by those who utilize all capabilities
    to see the wider intelligence picture.
  • OSINT refers to any intelligence gathered
    from publicly accessible resources, such as news
    reports, search engines, online databases, social
    media networks, blog posts as well as public
    government data, academic publications and more.
    OSINT can also be gathered from television
    reports, videos, public speeches, and other
    visual forms.

4
OSINT Explained
  • Publicly available intelligence, such as
    those available through database searches which
    aggregates information and have a quick
    turnaround rate, can be cost-effective for some
    organizations.
  • But gathering information from a vast range
    of sources is a time-consuming job and the danger
    of information overload is a concern for security
    agencies who must go through the unprecedented
    volume of intelligence theyve gathered and
    analyze it in order to have the detailed
    intelligence in the shortest amount of time
    possible.

5
OSINT Explained
  • In order to gain unmatched intelligence and
    in order for security agencies to save time and
    resources, OSINT tools such as specialized OSINT
    software which can anonymously and automatically
    monitor and manage content from across all layers
    of the internet must be used.
  • The OSINT software available from Cobwebs
    allows for security agencies to identify
    criminals who are intent on causing harm to
    others.

6
OSINT Explained
  • While many threat actors prefer to plan
    their nefarious crimes in the relative obscurity
    of the dark-web, many use OSINT to research,
    monitor and track their threat actors prior to an
    attack.
  • In order to prevent threat actors from
    succeeding, security agencies can passively or
    actively collect OSINT from a variety of feeds
    into a single accessible location. The harvesting
    of intelligence can be assisted by using
    artificial intelligence (AI), machine learning,
    and natural language processing (NPL) which
    automatically monitor and prioritize alerts.
Write a Comment
User Comments (0)
About PowerShow.com