Show simple item record

Petar Čisar
Sanja Maravic Cisar
Igor Füstner
2023-07-12T17:09:52Z
2023-07-12T17:09:52Z
2018
http://hdl.handle.net/20.500.14044/24289
This paper discusses the assessment of information system security. When referring to the security of an information system, the authors focus on three major features of the system: confidentiality, integrity and availability. Diverse methods are used to identify existing security eaknesses and security assessment, including the Kali Linux operating system. This work offers a wide-ranging overview of possible uses, benefits and drawbacks. The greatest advantage of implementing this operating system is the considerable collection of various tools for vulnerability assessment and penetration testing, mainly intended for ethical hacking. Further, the paper outlines which present forms of vulnerabilities are best identified by Kali.
dc.formatPDF
ENG
Security Assessment with Kali Linux
Open Access
Szerző
Budapest
Óbudai Egyetem
Kali Linux
information security assessment
vulnerability
penetration test
ethical hacking
Tudományos cikk
Bánki Közlemények
local.tempfieldCollectionsFolyóiratcikkek
ISSN 2560-2810
Kiadói változat
49-52. p.
1
1
2018
Óbudai Egyetem


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record