Preview

Digital Solutions and Artificial Intelligence Technologies

Advanced search

Using OSINT in a Modern Information Security System

Abstract

The article considers the possibilities of applying modern security auditing with the involvement of information collected from open sources (OSINT — ​ Open Source Intelligence). The prerequisites for the use of OSINT and economic intelligence in security analysis are outlined, and the key factors influencing the formation of comprehensive information security measures are analysed. Particular attention is given to discussing how the use of open data can improve the effectiveness of the vulnerability identification process while complying with legal and ethical standards. An integrated approach to information security analysis, based on the competent use of data from public registries, social networks, professional communities and other open sources, is seen as one of the key factors that increase the resilience of businesses and government agencies. In the context of this artikle, special attention is paid to the development of recommendations for organising the process of assessing the security of objects on the basis of open sources, which makes it possible to combine aspects of information security and economic intelligence, increasing the overall level of information literacy and systemic risk management. The purpose of this artikle is to develop a set of recommendations on how to organise the process of security analysis of the object of assessment with reliance on data obtained from open sources. On the basis of the analysis, organisational, technical and procedural measures have been developed to improve the efficiency of information security of the object, as well as the possibilities of integrating the results of periodic research based on open sources of information and regular security checks into the overall information security system.

About the Authors

E. K. Baranova
Financial University under the Government of the Russian Federation
Russian Federation

Elena K. Baranova — ​Associate Professor, Department of Information Security

Moscow



M. Yu. Petrov
Financial University under the Government of the Russian Federation
Russian Federation

Maksim Yu. Petrov — ​bachelor, Department of Information Security

Moscow



References

1. Babash A. V., Baranova E. K. Aktual’nye voprosy zashchity informatsii. Monografiia. 2-e izd., Moscow: RIOR: INFRA-M, 2025. URL: https://znanium.ru/catalog/document?id=459567. (In Russ.).

2. Baranova E. K., Komandirov A.IU. Teoretiko-metodologicheskie aspekty obespecheniia informatsionnoi bezopasnosti v nalogovoi sfere. Problemy informatsionnoi bezopasnosti sotsial’no-ekonomicheskikh system. Trudy XI Mezhdunarodnoi nauchno-prakticheskoi konferentsii, (Gurzuf, 13–15.02.2025). Gurzuf; 2025:53–56. (In Russ.). URL: https://elibrary.ru/item.asp?id=80375813

3. Nedomolkina IA.N. Competitive intelligence as a type of information support for decision-making in the field of forming and maintaining the competitiveness of an economic subject. Modern Economics: Problems and Solutions. 2023;4(160):101–117. (In Russ.). DOI: 10.17308/meps/2078-9017/2023/4/101-117

4. Baranova E. K., Smirnov D. V. Analiz zashhishhennosti informacionnoj sistemy` na osnove otkry`ty`x istochnikov informacii. Problemy`Informacionnoj bezopasnosti — ​ Sbornik statej V-oj Vserossijskoj nauchno-prakticheskoj konferencii s mezhdunarodny`m uchastiem (Simferopol`-Gurzuf, 14–16.02.2019). Simferopol`: IP Zueva T. V. 2019:79–80. (In Russ.). URL: https://publications.hse.ru/chapters/246796348

5. Sidorova M. E. Kuzmin A. R. OSINT and its application for cyber security. Vestnik of the Russian new University. “Complex Systems: models, analysis, management”. 2023;(1):1–14. (In Russ.). DOI: 10.18137/RNU.V9187.23.01.P.61

6. Balashov A. M. The use of It-technologies in various fields of activity and the formation of a new information and digital reality. The Theoretical Economy. 2022;(9):35–41. (In Russ.). DOI: 10.52957/22213260_2022_9_35

7. Shergin D. A., Yakovich Yu.O., Polikanin A. N. Using OSINT tools to perform targeted attacks. Сollection of Мaterials. International Scientific Conference “Interexpo GEO-Siberia 2024”. Novosibirsk; 2024;7(3):194–199. (In Russ.). URL: https://geosib.sgugit.ru/upload/geosibir/sborniki/2024/tom‑7–3/194–199.pdf.

8. Tikhnovetskiy D. I. Application of OSINT tools to enhance enterprise security. A young scientist. 2021;51(393):31– 33. URL: https://www.elibrary.ru/wizcxb

9. Tikhnovetskiy D. I. Application of OSINT tools to identify vulnerabilities in the enterprise information network. A young scientist. 2021;51(393):33–37. (In Russ.). URL: https://www.elibrary.ru/vtazph

10. Dvoryankin O. A. OSINT, Pentest and netstalking—information technologies of the Internet. National Association of Scientists (NAS). (In Russ.). 2022;84(2):6–13. URL: https://www.elibrary.ru/lqlpwz


Review

For citations:


Baranova E.K., Petrov M.Yu. Using OSINT in a Modern Information Security System. Digital Solutions and Artificial Intelligence Technologies. 2025;1(1):36-44. (In Russ.)

Views: 13


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 3033-7097 (Online)