OSINT Fundamentals a social engineering tools

OSINT Fundamentals a social engineering tools

@pdcsadmin

Terms used in osint

1. Anonymous - Not identified by name; of unknown name.

2. Breaches - A data breach is the intentional or unintentional release of secure or

private/confidential information to an untrusted environment.

3. Cyber Security - Cyber security refers to the body of technologies, processes, and

practices designed to protect networks, devices, programs, and data from attack,

damage, or unauthorized access.

4. Dark Web - The dark web refers to encrypted online content that is not indexed by

conventional search engines.

5. Database - A structured set of data held in a computer, especially one that is

accessible in various ways.

6. Data - Facts and statistics collected together for reference or analysis.

7. Deep Web - The deep web, invisible web, or hidden web are parts of the World Wide

Web whose contents are not indexed by standard web search-engines.

8. Defense - The action of defending from or resisting attack.

9. Disinformation - Disinformation is false or misleading information that is spread

deliberately to deceive.

10.DNS - Domain Name System.

11.Geolocation - Geolocation is the identification or estimation of the real-world

geographic location of an object, such as a radar source, mobile phone, or

Internet-connected computer terminal.

join our channel :https://t.me/joinchat/AAAAAFkAy8AlA1ugy6YwLg

12.Google Dork - Google hacking, also named Google dorking, is a computer hacking

technique that uses Google Search and other Google applications to find security holes

in the configuration and computer code that websites use.

13.Information - Facts provided or learned about something or someone.

14.IP - Internet Protocol.

15.Leak - A term used to describe a software issue that causes the computer or hardware

device to lose resources that are no longer in use.

16.Misinformation - False or inaccurate information, especially that which is deliberately

intended to deceive.

17.Operating System - The low-level software that supports a computer's basic

functions, such as scheduling tasks and controlling peripherals.

18.OPSEC - Operations Security.

19.OSINT - Open Source Intelligence.

20.Password Manager - A password manager is a software application or a hardware

device used to store and manage a person's passwords and strong passwords.

21.Protection - The action of protecting, or the state of being protected.

22.Search Engine - A search engine is an information retrieval system designed to help

find information stored on a computer system.

23.Social Networks - A social network is a website that allows people with similar

interests to come together and share information, photos and videos.

24. Sock Puppets - A sockpuppet is an online identity used for purposes of deception(A

false identity).

25.The Gray Literature - Grey literature are materials and research produced by

organizations outside of the traditional commercial or academic publishing and

distribution channels.

26.Tor - The Onion Router.

27.Validation - The action of checking or proving the validity or accuracy of something.

28.Virtualization - Virtualization is the process of running a virtual instance of a computer

system in a layer abstracted from the actual hardware.

29.VPN - Virtual Private Network.

share to your friends and learn together with us


FOR LEARNING HACKING AND PYTHON TUTORIALS, JOIN OUR HACKING AND CODING TUTORIALS CHANNEL FROM BELOW LINK

https://t.me/joinchat/AAAAAFkAy8AlA1ugy6YwLg

Report Page