Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT

Objective. The amount of personal data in open sources increases, which makes it possible for third parties to access it using open source intelligence (OSINT) methods, which can be used for malicious purposes. The aim of the work is to identify threats and existing methods and means of ensuring the...

Full description

Saved in:
Bibliographic Details
Main Authors: N. N. Romanova, V. V. Gryzunov
Format: Article
Language:Russian
Published: Dagestan State Technical University 2024-10-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/1564
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850023110988791808
author N. N. Romanova
V. V. Gryzunov
author_facet N. N. Romanova
V. V. Gryzunov
author_sort N. N. Romanova
collection DOAJ
description Objective. The amount of personal data in open sources increases, which makes it possible for third parties to access it using open source intelligence (OSINT) methods, which can be used for malicious purposes. The aim of the work is to identify threats and existing methods and means of ensuring the security of a user's personal data and his reputation when using OSINT by intruders, as well as to identify the main problems in protecting user PD taking into account OSINT. Method. The study uses an extended method of systematic literature review (e-SLR), which is a systematic literature review (SLR) supplemented by responses from ChatGPT, GigaCHAT, YndexGPT neural networks. Result. 41 sources were received for the analysis of the problem, on the basis of which threats to personal data were identified: violation of the confidentiality of personal data and the operation of information systems, targeted attacks using social engineering, password disclosure, espionage; protection tools: data processing before publication, anonymization and depersonalization, limitation of personal data, selection of sites, protection using OSINT, creation of complex passwords, use of protection tools, organizational measures; problems in the development of protection tools: working with big data, unreliability of information and sources, labor-intensiveness of data analysis, technical limitations, bias, ethical and legal aspects. Conclusion. The results were used to develop models for protecting personal data in open sources, methods and means for detecting and preventing violations of their security.
format Article
id doaj-art-270be1a5b5af413cb4f69d22c48604a3
institution DOAJ
issn 2073-6185
2542-095X
language Russian
publishDate 2024-10-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj-art-270be1a5b5af413cb4f69d22c48604a32025-08-20T03:01:28ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2024-10-0151313014410.21822/2073-6185-2024-51-3-130-144912Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINTN. N. Romanova0V. V. Gryzunov1Emperor Alexander I St. Petersburg State Transport UniversitySaint Petersburg University of State Fire Service of Emercom of RussiaObjective. The amount of personal data in open sources increases, which makes it possible for third parties to access it using open source intelligence (OSINT) methods, which can be used for malicious purposes. The aim of the work is to identify threats and existing methods and means of ensuring the security of a user's personal data and his reputation when using OSINT by intruders, as well as to identify the main problems in protecting user PD taking into account OSINT. Method. The study uses an extended method of systematic literature review (e-SLR), which is a systematic literature review (SLR) supplemented by responses from ChatGPT, GigaCHAT, YndexGPT neural networks. Result. 41 sources were received for the analysis of the problem, on the basis of which threats to personal data were identified: violation of the confidentiality of personal data and the operation of information systems, targeted attacks using social engineering, password disclosure, espionage; protection tools: data processing before publication, anonymization and depersonalization, limitation of personal data, selection of sites, protection using OSINT, creation of complex passwords, use of protection tools, organizational measures; problems in the development of protection tools: working with big data, unreliability of information and sources, labor-intensiveness of data analysis, technical limitations, bias, ethical and legal aspects. Conclusion. The results were used to develop models for protecting personal data in open sources, methods and means for detecting and preventing violations of their security.https://vestnik.dgtu.ru/jour/article/view/1564osintsystematic literature reviewinformation securitypersonal dataartificial intelligenceinformation security methods
spellingShingle N. N. Romanova
V. V. Gryzunov
Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
Вестник Дагестанского государственного технического университета: Технические науки
osint
systematic literature review
information security
personal data
artificial intelligence
information security methods
title Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
title_full Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
title_fullStr Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
title_full_unstemmed Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
title_short Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT
title_sort research by the method of an extended systematical literature review e slr the problem of ensuring the security of personal data when using osint
topic osint
systematic literature review
information security
personal data
artificial intelligence
information security methods
url https://vestnik.dgtu.ru/jour/article/view/1564
work_keys_str_mv AT nnromanova researchbythemethodofanextendedsystematicalliteraturerevieweslrtheproblemofensuringthesecurityofpersonaldatawhenusingosint
AT vvgryzunov researchbythemethodofanextendedsystematicalliteraturerevieweslrtheproblemofensuringthesecurityofpersonaldatawhenusingosint