Loading…
Frequently used methods in the preparation of the informational attack
Once with the development of WEB technologies, more attention has been paid to information originated from Internet websites being complementary to information obtained from other sources of interest. Specialized structures have been set up to collect, analyze and capitalize this information, theore...
Saved in:
Published in: | Scientific Bulletin ("Mircea cel Bătrân" Naval Academy) 2018-07, Vol.XIX (1), p.97-102 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Once with the development of WEB technologies, more attention has been paid to information originated from Internet websites being complementary to information obtained from other sources of interest. Specialized structures have been set up to collect, analyze and capitalize this information, theoretically and methodologically based on concepts and principles. Thus, definitions have been formulated for what Open Source Information (OSINF) and open-source intelligence (OSINT) are. This paper presents the stages and technological methods applied for an informational attack. |
---|---|
ISSN: | 2392-8956 1454-864X 1454-864X 2392-8956 |
DOI: | 10.21279/1454-864X-18-I1-014 |