OSINT Fundamentals a social engineering tools
@pdcsadmin
Terms used in osint
1. Anonymous - Not identified by name; of unknown name.
2. Breaches - A data breach is the intentional or unintentional release of secure or
private/confidential information to an untrusted environment.
3. Cyber Security - Cyber security refers to the body of technologies, processes, and
practices designed to protect networks, devices, programs, and data from attack,
damage, or unauthorized access.
4. Dark Web - The dark web refers to encrypted online content that is not indexed by
conventional search engines.
5. Database - A structured set of data held in a computer, especially one that is
accessible in various ways.
6. Data - Facts and statistics collected together for reference or analysis.
7. Deep Web - The deep web, invisible web, or hidden web are parts of the World Wide
Web whose contents are not indexed by standard web search-engines.
8. Defense - The action of defending from or resisting attack.
9. Disinformation - Disinformation is false or misleading information that is spread
deliberately to deceive.
10.DNS - Domain Name System.
11.Geolocation - Geolocation is the identification or estimation of the real-world
geographic location of an object, such as a radar source, mobile phone, or
Internet-connected computer terminal.
join our channel :https://t.me/joinchat/AAAAAFkAy8AlA1ugy6YwLg
12.Google Dork - Google hacking, also named Google dorking, is a computer hacking
technique that uses Google Search and other Google applications to find security holes
in the configuration and computer code that websites use.
13.Information - Facts provided or learned about something or someone.
14.IP - Internet Protocol.
15.Leak - A term used to describe a software issue that causes the computer or hardware
device to lose resources that are no longer in use.
16.Misinformation - False or inaccurate information, especially that which is deliberately
intended to deceive.
17.Operating System - The low-level software that supports a computer's basic
functions, such as scheduling tasks and controlling peripherals.
18.OPSEC - Operations Security.
19.OSINT - Open Source Intelligence.
20.Password Manager - A password manager is a software application or a hardware
device used to store and manage a person's passwords and strong passwords.
21.Protection - The action of protecting, or the state of being protected.
22.Search Engine - A search engine is an information retrieval system designed to help
find information stored on a computer system.
23.Social Networks - A social network is a website that allows people with similar
interests to come together and share information, photos and videos.
24. Sock Puppets - A sockpuppet is an online identity used for purposes of deception(A
false identity).
25.The Gray Literature - Grey literature are materials and research produced by
organizations outside of the traditional commercial or academic publishing and
distribution channels.
26.Tor - The Onion Router.
27.Validation - The action of checking or proving the validity or accuracy of something.
28.Virtualization - Virtualization is the process of running a virtual instance of a computer
system in a layer abstracted from the actual hardware.
29.VPN - Virtual Private Network.
share to your friends and learn together with us
FOR LEARNING HACKING AND PYTHON TUTORIALS, JOIN OUR HACKING AND CODING TUTORIALS CHANNEL FROM BELOW LINK