Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities

dc.authorscopusid58706004700
dc.authorscopusid57964038500
dc.authorscopusid58705853600
dc.authorscopusid6602924425
dc.authorscopusid6507328166
dc.contributor.authorEcevit, Mert İlhan
dc.contributor.authorDağ, Hasan
dc.contributor.authorNaqvi,N.Z.
dc.contributor.authorCreutzburg,R.
dc.contributor.authorDag,H.
dc.date.accessioned2024-06-23T21:39:19Z
dc.date.available2024-06-23T21:39:19Z
dc.date.issued2023
dc.departmentKadir Has Universityen_US
dc.department-tempPervez M.H., Kadir Has University, Dept. of Management Information Systems, Istanbul, Turkey; Ecevit M.I., Cyber Security and Critical Infrastructure Research Center, Kadir Has University, Istanbul, Turkey; Naqvi N.Z., Cyber Security Graduate Program, Kadir Has University, Istanbul, Turkey; Creutzburg R., Berlin School of Technology, Srh Berlin University of Applied Sciences, Berlin, Germany; Dag H., Cyber Security and Critical Infrastructure Research Center, Kadir Has University, Istanbul, Turkeyen_US
dc.description.abstractThis article explores open-source intelligence (OS-INT) to identify the vulnerabilities and loopholes in power grid systems, focusing on an electrical distribution company operating in Turkey. The study emphasizes the potential risks of sharing publicly available information on social media accounts, websites, reports, and press releases which most companies overlook. It highlights that individuals or adversaries can exploit this information to harm companies and countries that may not be fully aware of these vulnerabilities. OSINT tools can efficiently gather interpretable data on a company, which companies unknowingly share. By refining the collected data, the study aims to understand the technologies used, their software versions, and any associated vulnerabilities. Web scraping tools extract data from the company's website, which may contain critical information about updates, ongoing systems, and technologies. The article provides a comprehensive understanding of the potential risks and vulnerabilities associated with sharing sensitive information and the various OSINT tools and techniques that can be used to identify and address these vulnerabilities. The importance of vigilance against the potential harm that remote or unrelated individuals can inflict using OSINT capabilitiesis underscored. This study shows how easy it is to detect vulnerabilities in a critical infrastructure system using OSINT tools. © 2023 IEEE.en_US
dc.description.sponsorshipMethodius University in Skopje; UKIM; European Commission, EC; Erasmus+, (101082683)en_US
dc.identifier.citation0
dc.identifier.doi10.1109/UBMK59864.2023.10286573
dc.identifier.endpage443en_US
dc.identifier.isbn979-835034081-5
dc.identifier.scopus2-s2.0-85177604717
dc.identifier.scopusqualityN/A
dc.identifier.startpage438en_US
dc.identifier.urihttps://doi.org/10.1109/UBMK59864.2023.10286573
dc.identifier.urihttps://hdl.handle.net/20.500.12469/5850
dc.identifier.wosqualityN/A
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofUBMK 2023 - Proceedings: 8th International Conference on Computer Science and Engineering -- 8th International Conference on Computer Science and Engineering, UBMK 2023 -- 13 September 2023 through 15 September 2023 -- Burdur -- 193873en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectcritical infrastructure protectionen_US
dc.subjectcyber risken_US
dc.subjectcyber securityen_US
dc.subjectMaltegoen_US
dc.subjectOSINT investigationen_US
dc.subjectpower griden_US
dc.subjectShodanen_US
dc.titleTowards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilitiesen_US
dc.typeConference Objecten_US
dspace.entity.typePublication
relation.isAuthorOfPublication32d2136a-cb55-4ba5-9e30-1767c6f3b090
relation.isAuthorOfPublicatione02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isAuthorOfPublication.latestForDiscovery32d2136a-cb55-4ba5-9e30-1767c6f3b090

Files