Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi

How to use the Linux Kali operating system and ethical hacking (CROSBI ID 300578)

Prilog u časopisu | prethodno priopćenje | međunarodna recenzija

Šimović, Vladimir ; Varga, Matija ; Bevanda, Kristina How to use the Linux Kali operating system and ethical hacking // Et2er : ekonomija, turizam, telekomunikacije i računarstvo, 3 (2021), 2; 125-132

Podaci o odgovornosti

Šimović, Vladimir ; Varga, Matija ; Bevanda, Kristina

engleski

How to use the Linux Kali operating system and ethical hacking

This research paper on "How to use the Linux Kali operating system and Ethical Hacking" will examine: (1) respondents' opinions about hackers, i.e., whether they consider hackers to be moral or immoral people and which hackers are bad or good, (2) whether respondents have ever hacked or not, (3) if respondents have not ever hacked, what was the reason, (4) if respondents have hacked, what was the reason, (5) whether respondents, i.e., the 'respondents' data, have ever been hacked on a computer and / or on social networks, (6) what the reasons for hacking were according to the respondents, (7) whether there is a need to introduce the teaching of ethical hacking in certain subjects in schools and / or in university courses, (8) whether the respondents believe that hackers are malicious people, (9) whether the respondents have heard of the operating system Kali Linux, (10) whether respondents knew that Kali Linux strongly supports open source and that it is free, (11) whether respondents have ever used Kali Linux, (12) whether respondents have used and/or use Kali Linux and if they hacked-what they think are the best tools for hacking and penetration testing, (13) whether respondents knew that one of the six basic principles of hacking ethics is: "All information must be free", (14) whether respondents agreed with the assertion that: "Many hackers show that 'real hackers' use the most used Windows to protect their identity", (15) whether the respondents knew that Kali Linux, a Linux distribution based on Debian, is intended for digital forensics, penetration testing and hacking. In addition to the survey, the paper will also use the scientific method of content analysis, based on which individual definitions of open-source application programs for ethical hacking will be given, including definitions of operating systems from the group of open-source tools, with an emphasis on Kali Linux. The survey was carried out on respondents (sample) who belong to the group of hacking tools users. Also, all types of hackers will be explained theoretically.

ethical hacking ; Kali Linux hackers ; operating system ; survey

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

3 (2)

2021.

125-132

objavljeno

2670-8930

Povezanost rada

nije evidentirano

Poveznice