Live Virtual Machine Lab 2.1: Modul 02 PenetrationsteststechniquesExercise 1 - Explain penetration tests and their typesTask 1 - Penetration testingA penetration test is often referred to as a pen test and is used to uncover, exploit and understandthe severity of vulnerabilities in applications, network devices and infrastructureComponents such as web server, application server, database server etc.PenetrationstestsWhen an application is developed in an insecure manner, the network and infrastructureComponents are not hardened or secured, leading to weak points that can beso-called loopholes or security gaps. Vulnerability analysis is a technique that revealsthose loopholes in a system.Penetration testing follows the following process:Discovery, Enumeration, Vulnerability Mapping, Exploitation und ReportingTypes of penetration testingBlack box testing is performed without prior knowledge of the information system,Infrastructure component or the application being tested against.Credentials used to authenticate with the systems are not shared and must be revealed aspart of the assessment. This type of testing simulates a real-world attack by aexternal party. Black box tests are also known as zero knowledge tests.a commonThe disadvantage of this type of testing is that not all vulnerabilities are likely to be detected.Another disadvantage is that the test team can inadvertently interact with another system.White box testing is performed with full knowledge of the information system,Infrastructure component or application under test. For example in the case ofApplication white box penetration testing, the full details of the applicationincluding the URL, authentication credentials, data flow, and other test informationprovided in advance for the execution of the test. In extreme cases, the complete source codeof the application or the complete network topology is shared with the tester for identificationUses.A white box test allows the tester or test team to achieve specific internal goalscontrols and functions. It can give better results but doesn't simulate a real worldAttack.
Show
- Domain 1.0 Threats, Attacks and Vulnerabilities
- Domain 2.0 technologies and tools
- Domain 3.0 architecture and design
- Domain 4.0 identity and access management
- Domain 5.0 risk management
- Domain 6.0 cryptography and PKI
- What kind of phishing is done by voice?
- What kind of phishing is being carried out over the voice over IP lines where the attacker is pretending to be a legitimate caller to a bank?
- Which threat hunting method includes Disrupt Deny Destroy and Degrade actions?
- Which of the following is considered the root of the Active Directory hierarchy?
The Domain Name System, commonly known as DNS, is often referred to as the "phone book" of the Internet. Every time we access the Internet to visit our favorite websites, shop online and pay bills, or access online healthcare or banking portals, we rely on DNS infrastructure to keep ours secure intended goals. While this shared infrastructure is incredibly powerful and useful, it also provides a rich attack surface for threat actors: allowing them to shut down websites and online services, replace legitimate website content with threats and extortion attempts, or even traffic to a copy of a legitimate website to steal all information entered by users who intend to conduct business as usual. "Understanding DNS Attacks" provides important information you need to know to protect yourself and your organization from DNS infrastructure tampering, including common vulnerabilities, how to identify a potential attack, and guidance and best practices to mitigate the Reduce the likelihood and impact of a successful DNS attack.
Table of contentsShow
- Domain 1.0 Threats, Attacks and Vulnerabilities
- Domain 2.0 technologies and tools
- Domain 3.0 architecture and design
- Domain 4.0 identity and access management
- Domain 5.0 risk management
- Domain 6.0 cryptography and PKI
Accessible to non-technical learners, including managers and business leaders, this webinar provides an organizational perspective useful for technical specialists.
Learning goals:
Empower learners to protect, label, and protect themselves and their organizations from attacks on DNS infrastructure by learning about common attack schemes, best practices, CISA guidance, and resources.
- Define DNS manipulations and explain common attack methods
- Identify signs of a DNS attack
- Learn about countermeasures against DNS attacks
- Understand the process of recovering from a DNS attack
- Investigate the impact of DNS attacks using case studies
Datum: 2021
Training Competency Area: Level 1 - Beginner
Training purpose: competence development
Alignment with the NIST SP 800-181 Cybersecurity Workforce Framework
Category | specialty | working roles |
---|---|---|
Analyze | All-Source-Analyse | Mission Assessment Specialist |
collect and operate | collection operations | All-Source Collection Manager, All-Source Collection Requirements Manager |
operate and maintain | Customer Service and Technical Support | Technical Assistance Specialist |
operate and maintain | data management | Data Analyst, Database Administrator |
operate and maintain | knowledge management | knowledge manager |
operate and maintain | network services | Network Operations Specialist |
operate and maintain | system administration | Systemadministrator |
Monitor and rule | Cybersicherheitsmanagement | communications security manager; Information systems security manager |
Monitor and rule | Program Management and Acquisition | IT Investment Manager, IT Program Reviewer, IT Project Manager, Product Support Manager, Program Manager |
Monitor and rule | Strategic planning and politics | cyber policy and strategy planner; Cyber Workforce developer and manager |
Monitor and rule | Training, Education and Awareness | Cyber Curriculum Developer |
Protect and defend | Cyber Defense infrastructure support | Cyber Defense Infrastructure Support Specialist |
Protect and defend | Response to Incidents | Cyber Defense Incident Responder |
Protect and defend | Vulnerability assessment and management | Vulnerability Analysis Analyst |
Secure Deployment | risk management | Authorizing Officer; Security control inspector |
Secure Deployment | system architecture | Enterprise Architect, Security Architect |
Secure Deployment | System requirements planning | System requirements planner |
Secure Deployment | testing and evaluation | System testing and evaluation specialist |
Lesson 1: Explanation of the OSI and TCP/IP models
Lesson 2: Explain the characteristics of network traffic
Lesson 3: Installing and Configuring Switched Networks
Lesson 4: Configuring IP Networks
Lesson 4: Configuring IP Networks
Lesson 5: Installing and configuring routed networks
Lesson 6: Configure and Monitor Ports and Protocols
Lesson 7: Explain Network Application and Storage Services
Lesson 8: Monitor and troubleshoot networks
Lesson 9: Explain Network Attacks and Countermeasures
Lesson 10: Install and Configure Security Devices
Lesson 11: Explain authentication and access controls
Lesson 12: Deploying and Troubleshooting Cabling Solutions
Lesson 13: Implementing and Troubleshooting Wireless Technologies
Lesson 14: Compare and contrast WAN technologies
Lesson 15: Using Remote Access Methods
Remedial review of the lessons covered.
Remedial review of the lesson
Remedial review of the lessons covered.
Remedial review of the lessons covered.
The Security+ course lasts five (5) weeks and includes 45 hours of instructor-led live training and hands-on instructor-led labs plus Q&A sessions. The course is led by knowledgeable trainers and includes the online tuition course, e-book and hardcover book, trainer-led labs and trainer/SME led question and answer sessions.
Domain 1.0 Threats, Attacks and Vulnerabilities
1.1 Given a scenario, analyze the indicators of compromise and determine the type of malware.
1.2 Compare and contrast types of attacks1.2.1 Social Engineering 1.2.2 Application/Service Attacks 1.2.3 Cryptographic Attacks 1.2.4 Hijacking 1.2.5 Network/Wireless Attacks
1.3 Explain types and characteristics of threat actors
1.3.1 Types of Actors 1.3.2 Characteristics of Actors1.4 Explain penetration testing concepts
1.4.1 Penetration Testing Process 1.4.1.1 Reconnaissance 1.4.1.2 First Exploitation 1.4.1.3 Persistence 1.4.1.4 Pivot 1.4.1.5 Privilege Escalation 1.4.2 Penetration Testing vs. Vulnerability Scanning 1.4.3 Black Box vs. Gray Box vs. white box1.5 Explain vulnerability scanning concepts
1.5.1 Identify 1.5.1.1 Vulnerability/Unpatched System or Application 1.5.1.2 Missing Security Controls 1.5.1.3 Common Misconfigurations 1.5.2 Intrusive vs Non-Intrusive 1.5.3 Eligible vs Unauthenticated1.6 Explain the implications associated with types of vulnerabilities
1.6.5 Processing of Application Input
Domain 2.0 technologies and tools
2.1 Installation and configuration of network components, both hardware and software based, for support
organizational security2.1.1 Network Equipment: Router, Switch, Bridge, Load Balancer, Proxy2.1.2 Gateways: Email, Media2.1.3 Access Points2.1.4 Firewall2.1.5 NAC2.1.6 VPN/SSL/TLS Accelerator and Decryptor2.1.7 NIPS/NIDS2 .1.8 DLP2.1.9 SIEM
2.2 Given a scenario, use appropriate software tools to assess an organization's security posture
2.2.1 Network Scanner2.2.2 Protocol Analyzer2.2.3 Wireless Scanners/Crackers2.2.4 Exploitation Frameworks2.2.5 Passive vs. Active2.2.6 Scanners: Vulnerabilities, Configuration Compliance and Inventory2.2.7Password Crackers2.2.8 Backup Utilities2.2.9 Honeypot/Honeynet2.2.10 Steganografie2 .2.11 Command line tools: Unix/Linux and Windows2.3 Fix common security issues in a given scenario
2.3.1 Personal 2.3.2 Asset Management / misconfigured devices 2.3.3 Identity, Access, Authentication, Authorization and Audit (IAAAA) 2.3.4 Encryption2.4 In a given scenario, analyze and interpret the results of security technologies
2.4.1 Network Security Technologies 2.4.2 Host Security Technologies 2.4.3 Data Security Technologies2.5 Deploying Mobile Devices Securely in a Given Scenario
2.5.1 Connection Methods2.5.2 Mobile Device Management Concepts2.5.3 Enforcement and Monitoring2.5.4 Deployment Models2.6 In a given scenario, implement secure protocols
2.6.1 Logs2.6.2 Use Cases
Domain 3.0 architecture and design
3.1 Explain use cases and purpose for frameworks, best practices, and secure configuration guides3.1.1 Industry standard frameworks and reference architectures 3.1.2 Benchmarks/guides for secure configurations 3.1.3 Defense-in-depth/layered security
3.2 Given a scenario, implement concepts for secure network architectures.
3.2.1 Zones/Topologies 3.2.2 Segregation/Segmentation/Isolation 3.2.3 VPN/Tunneling 3.2.4 Security Device/Technology Placement 3.2.5 Software Defined Networks (SDN)3.3 Given a scenario, implement a secure system design
3.3.1 Hardware/Firmware Security 3.3.2 Operating System Security 3.3.3 Peripherals3.4 Explain the importance of secure deployment concepts
3.4.1 Secure Baseline 3.4.2 Sandboxing 3.4.3 Environment 3.4.4 Integrity Measurement3.5 Explain the security implications of embedded systems.
3.5.1 ICS / SCADA3.5.2 IoT / Smart Devices3.5.3 Printers / MFDs3.5.4 Camera systems3.5.5 Special Purpose3.6 Summarize secure application development and deployment concepts
3.6.1 Development Lifecycle Models 3.6.2 Secure DevOps / SecDevOps 3.6.3 Version Control and Change Management 3.6.4 Deployment and Deprovisioning 3.6.5 Secure Coding Techniques 3.6.6 Code Quality and Testing3.7 Summarize cloud and virtualization concepts
3.7.1 Hypervisor3.7.2 Virtual Machine (VM)3.7.3 Cloud Computing3.7.3.1 Deployment Models3.7.3.2 Storage3.7.3.3 Access3.8 Explain how resiliency and automation strategies reduce risk
3.8.1 Automation/Scripting 3.8.2 Master Image 3.8.3 Non-Persistence 3.8.4 Shapes and Functions3.9 Explain the importance of physical security controls
Domain 4.0 identity and access management
4.1 Compare and contrast identity and access management concepts.4.1.1 Identification, Authentication, Authorization and Accounting (AAA) 4.1.2 Multi-Factor Authentication 4.1.3 Single Sign-On (SSO) / Federation
4.2 In a given scenario, install and configure identity and access services
4.3 Given a scenario, implement identity and access management controls4.3.1 Access control models 4.3.2 Physical access control 4.3.3 Biometrics 4.3.4 Tokens 4.3.5 Certificate-based authentication 4.3.6 Authorization: file system and database 4.4 Given a scenario, distinguish common account management practices. 4.4.1 General concepts 4.4.2 Account types
4.4.3 Enforcement of Account Policies
Domain 5.0 risk management
5.1 Explain the importance of corporate security policies, plans and procedures5.1.1 Standard Operating Procedures 5.1.2 Contract Types 5.1.3 Human Resource Management 5.1.4 General Security Policies
5.2 Summarize the concepts of business impact analysis
5.3 Explain risk management processes and concepts5.3.1 Threat Assessment 5.3.2 Risk Assessment 5.3.3 Change Management
5.4 In a given scenario, follow incident response procedures
5.4.1 Incident Response Plan5.4.2 Incident Response Process5.5 Summarize basic forensic concepts
5.5.1 Data Collection 5.5.2 Custody / Order of Volatility 5.5.3 Chain of Custody 5.5.4 Legal Hold 5.5.5 Recovery5.6 Explain concepts related to disaster recovery and business continuity
5.6.1 Backup concepts 5.6.2 Geographical considerations 5.6.3 Business continuity planning 5.6.4 Recovery locations 5.6.5 Order of recovery5.7 Compare and contrast different types of controls
5.7.1 Administrative 5.7.2 Technical 5.7.3 Physical 5.7.4 Corrective 5.7.5 Preventive 5.7.6 Detective 5.7.7 Dissuasive 5.7.8 Compensatory5.8 In a given scenario, implement data security and privacy practices
5.8.1 Data Confidentiality Labeling and Handling 5.8.2 Data Roles 5.8.3 Data Destruction and Media Sanitization5.8.4 Legal and Compliance
Domain 6.0 cryptography and PKI
6.1 Compare and contrast basic concepts of cryptography6.1.1 Symmetric Algorithms 6.1.2 Asymmetric Algorithms 6.1.3 Hashing 6.1.4 Keys and Key Exchange 6.1.5 Digital Signatures 6.1.6 Common Use Cases
6.2 Explain cryptography algorithms and their basic properties
6.2.1 Symmetric Algorithms 6.2.2 Cipher Modes 6.2.3 Asymmetric Algorithms 6.2.4 Hashing Algorithms6.3 In a given scenario, install and configure the wireless security settings
6.3.1 Cryptographic Protocols 6.3.2 Authentication Protocols 6.3.3 Methods6.4 Given a scenario, implement a public key infrastructure
6.4.1 Components 6.4.2 Concepts 6.4.3 Types of Certificates6.4.4 Certificate Formats
The Certified Ethical Hacker (CEH) certification is the most trusted ethical hacking certification and achievement recommended by employers worldwide. It is the most coveted information security certification and represents one of the fastest growing cyber certifications required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it has been recognized as a standard in the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The five phases of ethical hacking and CEH's original core mission are still valid and relevant today: "To beat a hacker, you need to think like a hacker."
Course overview:
Module 01: Introduction to Ethical Hacking |
Module 02: Footprinting and Reconnaissance |
Module 03: Network Scanning |
Module 04: Enumeration |
Module 05: Vulnerability Analysis |
Modul 06: System-Hacking |
Module 07: Malware Threats |
Module 08: Sniffing |
Modul 09: Social Engineering |
Modul 10: Denial-of-Service |
Module 11: Session Hijacking |
Module 12: Bypassing IDS, Firewalls and Honeypots |
Module 13: Hacking Web Servers |
Module 14: Hacking Web Applications |
Modul 15: SQL-Injection |
Module 16: Hacking Wireless Networks |
Module 17: Hacking mobiles The platform |
Module 18: IoT-Hacking |
Modul 19: Cloud-Computing |
Module 20: Cryptography |
Basics of information technology
- IT concepts and terminology
- Establishment of the infrastructure
- Applications & Software
- software development
- Database Basics
- Essential security
Basics and intermediate knowledge in software and hardware support
- Hardware
- operating systems
- Software Troubleshooting
- Networking
- Hardware and network troubleshooting
- Security
- mobile devices
- Virtualization & Cloud Computing
- operating procedures
End user awareness
- information protection
- cyber terrorism
- Social Development
- Security for remote workers
- virus protection
- password security
- Web Browser Security
- Email Security
- Instant messaging security
- phone security
- Mobile security
Intermediate network concepts
- networking concepts
- Infrastructure
- networking
- network security
- Network troubleshooting and tools
intermediate security concepts
- Attacks, Threats and Vulnerabilities
- architecture and design
- implementation
- Operation and Incident Response
- Governance, Risiko und Compliance
Basics of information technology
- IT concepts and terminology
- Establishment of the infrastructure
- Applications & Software
- software development
- Database Basics
- Essential security
Intermediate network concepts
- networking concepts
- Infrastructure
- networking
- network security
- Network troubleshooting and tools
intermediate security concepts
- Attacks, Threats and Vulnerabilities
- architecture and design
- implementation
- Operation and Incident Response
- Governance, Risiko und Compliance
Cloud Computing
- Cloud architecture and design
- CloudSicherheit
- Cloud Deployment
- Operations & Support
- Troubleshooting
Operating system and server and workstation concepts
- Vulnerability analysis and risk management
- Students will learn how to tackle problems including:
- Vulnerability assessment frameworks
- Vulnerability Assessment Techniques
- Vulnerability assessment tools
- Identify and respond to vulnerabilities
- Conduct a vulnerability analysis
Cyber Policy and Compliance
- Basics of risk assessment
- Steps to the risk assessment process
- risk assessment process
- risk mitigation and management
Critical Controls
Security and Network Operations Center Concepts
- Basics of Security and the Network Operations Center
- Incident Detection and Response
- Security Event and Information Management (SEIM) bzw
- Security Information and Event Management (SIEM)
- SEIM Deployment and Operations
Intermediate network concepts
- networking concepts
- Infrastructure
- networking
- network security
- Network troubleshooting and tools
intermediate security concepts
- Attacks, Threats and Vulnerabilities
- architecture and design
- implementation
- Operation and Incident Response
- Governance, Risiko und Compliance
vulnerability analysis
- Vulnerability assessment frameworks
- Vulnerability Assessment Techniques
- Vulnerability assessment tools
- Identify and respond to vulnerabilities
- Conduct a vulnerability assessment
Basics of ethical hacking and penetration testing
- New attack vectors
- Count
- Malware und Reverse Engineering
- Cloud Computing
- Web application hacking
- operating technologies
- WLAN-Cracking
- Penetrationstestlabore
Ethical hacking and penetration testing for advanced users
- Planning & scoping
- Gathering information and identifying vulnerabilities
- Attacks & Exploits
- Penetration testing tools
- Reporting & Communication
- Ethical Hacking Labs
Advanced ethical hacking and penetration testing
- Penetration Testing: What You Should Know
- Familiarize yourself with Kali Linux
- command line fun
- Handy tools
- BashScripting
- Passive information gathering
- Active information gathering
- Vulnerability Scanning
- Attacks on web applications
- Introduction to Buffer Overflows
- Windows buffer overflows
- Linux buffer overflows
- Client-Side Attacks
- Finding Public Exploits
- Fix exploits
- File Transfers
- antivirus bypass
- privilege escalation
- Password Attacks
- Port redirection and tunneling
- ActiveDirectory-Angriffe
- The Metasploit framework
- PowerShell-Imperium
- Penetration Testing Labs
What kind of phishing is done by voice?
Voice-Phishing, are calls from attackers posing as government agencies like the IRS, software vendors like Microsoft, or services offering help with benefits or credit card rates. Attackers often appear to be calling from a local number near you.
What kind of phishing is being carried out over the voice over IP lines where the attacker is pretending to be a legitimate caller to a bank?
Vishing, sometimes also called cyber-vishing, is a form of phishing that uses a traditional phone or VoIP (Voice over Internet Protocol) call with either an actual person speaking, a text, or other vishing tools.
Which threat hunting method includes Disrupt Deny Destroy and Degrade actions?
kill chainsare a military concept; In the original paper, the authors create a very clever matrix that relates action flows to DoD IO actions: detect, deny, interrupt, demote, deceive, and destroy.
Which of the following is considered the root of the Active Directory hierarchy?
An Active Directory always starts with aForest root domain, which is automatically the first domain you install. This root domain becomes the basis for additional directory components.
FAQs
Which of the following are the phases in open source intelligence Osint? ›
Open source intelligence (OSINT) is the process of identifying, harvesting, processing, analyzing, and reporting data obtained from publicly available sources for intelligence purposes.
What command is used to detect an OS on a target? ›Service and OS detection
Nmap is one of the most popular tools used for the enumeration of a targeted host. Nmap can use scans that provide the OS, version, and service detection for individual or multiple devices.
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.
What is it called when a threat actor takes information for the purpose of impersonating someone quizlet? ›What is it called when a threat actor takes information for the purpose of impersonating someone? Identity theft. Which of the following is a social engineering attack that uses social media and other sources to achieve its goal? Hybrid warfare influence campaign.
How do I break into OSINT? ›To begin, select a single piece of information such as your full name, email address or username/alias, then start Google dorking and searching social media sites. Googles multitude of search operators is one of your most powerful skills, use it to find as much initial information as possible.
Is open source intelligence OSINT legal or illegal? ›OSINT is completely legal because it only uses information that is available through “open sources”. This means that it doesn't include information that is kept within your organisation's database, but rather just information available from public sources.
Which command is used for detecting devices on a network? ›Ping Command
The ping command is one of the most often used networking utilities for detecting devices on a network and for troubleshooting network problems.
2. Introduction to Trap in OS. A trap is a synchronous interrupt triggered by an exception in a user process to execute functionality. Exception conditions like invalid memory access, division by zero, or a breakpoint can trigger a trap in an OS. A trap changes the mode of an OS to a kernel routine.
Can Nmap scan be detected? ›Intrusive scans, particularly those using Nmap version detection, can often be detected this way. But only if the administrators actually read the system logs regularly. The vast majority of log messages go forever unread.
Which can be used to detect if a Trojan has infected a system? ›Use your antivirus software to scan your PC for Trojans and other malware. Your software should detect the malware and remove it automatically. Recover damaged files or data.
What is the difference between SSL and OpenSSL? ›
OpenSSL is the programming library used to implement TLS, i.e. the actual encryption and authentication. Whereas your "secure SSL" is just the certificate you install at the server.
What software uses OpenSSL? ›OpenSSL is included in many operating systems (Windows, macOS, various Linux distributions, etc.); client-side software; web and email server software (Apache, nginx, etc.); network appliances (Cisco, Fortinet, Juniper, etc.), industrial control systems, and so on.
What is it called when a threat actor takes information for the purpose of impersonating someone? ›Pretexting Definition
A pretext is a made-up scenario developed by threat actors for the purpose of stealing a victim's personal data. During pretexting attacks, threat actors typically ask victims for certain information, stating that it is needed to confirm the victim's identity.
A threat actor or advanced persistent threat usually seeks monetary gain. They do this by retrieving data that they can sell to a third party or by directly exploiting a victim through a ransomware attack. Insider threats may be following the lead of other cybercriminals by selling information to competitors.
Do hackers use OSINT? ›Hackers, though, utilize OSINT to perform reconnaissance on their targets. A quick Google search for “OSINT tools” exemplifies the sheer number of resources that criminals have at their disposal. OSINT Framework even provides a categorized list of hundreds of OSINT tools that anyone can use.
How do you break into the AI field? ›Explore possible career paths in AI
You'll need a bachelor's degree for these entry-level jobs. Your next step is to earn your master's degree in data science, computer science, software engineering, or similar. You may also want to work on gaining some certifications, building your skills, and creating your portfolio.
Microsoft: Hackers are using open source software and fake jobs in phishing attacks. Microsoft details how hackers are using easily available tools and non-existent job offers to trick developers and IT workers.
Can you get sued for open source? ›A mere member of the public can't sue to enforce an open source license. Intellectual property laws narrowly limit standing. Only the owner of a copyright or patent may sue to enforce the copy- right or patent.
Does the CIA use OSINT? ›About the Job
As an Open Source Exploitation Officer (OSEO) for CIA, you will discover, collect, and assess foreign-based, publicly available information, also known as Open Source Intelligence (OSINT) in a dynamic, ever-expanding digital environment.
Which of the following are the phases in Open Source Intelligence (OSINT)? [Choose all that apply] Data Processing Result Delivery Data Analysis Source Identification Data Harvesting.
How many steps are in a OSINT cycle? ›
Five steps of the OSINT cycle consists of Planning, Gathering, Analysis, Dissemination and Feedback.
What are the phases of the intelligence cycle? ›The intelligence cycle is one of active collaboration and consists of six steps: requirements, planning and direction, collection, processing and exploitation, analysis and production, and dissemination. The cycle is circular in nature and the movement between the steps is fluid.
What is open source intelligence OSINT )? Quizlet? ›Terms in this set (20)
what is open source intelligence (OSINT)? intelligence collected from publicly available sources.