Skip to main content
. 2022 Jun 4;13(5):747–757. doi: 10.1007/s12530-022-09431-7

Table 2.

Examples of cybersecurity data sources

Type Platforms Metadata Data source Description
External Shodan, Censys, Fofsa, BinaryEdge IP, banner data, images IoT search engines Search engines of publicly accessible IoT devices
Hansa, DreamMarket Product/author name, price DarkNet marketplaces Markets for illicit goods
EMBER, VirusTotal Hash, binary, date, malware reports Malware Repositories Sites collecting malware reports
Internal File store, disk drives, file directories File size, directory name, file name, directory size File store, disk drives, file directories Devices that store data from users and networks
BurpSuite, Nessus, Qualys, OpenVAS Name, severity, risk Vulnerability assessment Reports from vulnerability scanning tools
Docker, containers, VMware Operating system, applications, file systems Workstations and virtual machines Computational machines