Loading…

Frequently used methods in the preparation of the informational attack

Once with the development of WEB technologies, more attention has been paid to information originated from Internet websites being complementary to information obtained from other sources of interest. Specialized structures have been set up to collect, analyze and capitalize this information, theore...

Full description

Saved in:
Bibliographic Details
Published in:Scientific Bulletin ("Mircea cel Bătrân" Naval Academy) 2018-07, Vol.XIX (1), p.97-102
Main Author: Radu, Moinescu
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Once with the development of WEB technologies, more attention has been paid to information originated from Internet websites being complementary to information obtained from other sources of interest. Specialized structures have been set up to collect, analyze and capitalize this information, theoretically and methodologically based on concepts and principles. Thus, definitions have been formulated for what Open Source Information (OSINF) and open-source intelligence (OSINT) are. This paper presents the stages and technological methods applied for an informational attack.
ISSN:2392-8956
1454-864X
1454-864X
2392-8956
DOI:10.21279/1454-864X-18-I1-014