Pregled bibliografske jedinice broj: 1156461
How to use the Linux Kali operating system and ethical hacking
How to use the Linux Kali operating system and ethical hacking // Et2er - ekonomija, turizam, telekomunikacje i računarstvo, 3 (2021), 2; 125-132 (međunarodna recenzija, prethodno priopćenje, znanstveni)
CROSBI ID: 1156461 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
How to use the Linux Kali operating system and
ethical hacking
Autori
Šimović, Vladimir ; Varga, Matija ; Bevanda, Kristina
Izvornik
Et2er - ekonomija, turizam, telekomunikacje i računarstvo (2670-8930) 3
(2021), 2;
125-132
Vrsta, podvrsta i kategorija rada
Radovi u časopisima, prethodno priopćenje, znanstveni
Ključne riječi
ethical hacking ; Kali Linux hackers ; operating system ; survey
Sažetak
This research paper on "How to use the Linux Kali operating system and Ethical Hacking" will examine: (1) respondents' opinions about hackers, i.e., whether they consider hackers to be moral or immoral people and which hackers are bad or good, (2) whether respondents have ever hacked or not, (3) if respondents have not ever hacked, what was the reason, (4) if respondents have hacked, what was the reason, (5) whether respondents, i.e., the 'respondents' data, have ever been hacked on a computer and / or on social networks, (6) what the reasons for hacking were according to the respondents, (7) whether there is a need to introduce the teaching of ethical hacking in certain subjects in schools and / or in university courses, (8) whether the respondents believe that hackers are malicious people, (9) whether the respondents have heard of the operating system Kali Linux, (10) whether respondents knew that Kali Linux strongly supports open source and that it is free, (11) whether respondents have ever used Kali Linux, (12) whether respondents have used and/or use Kali Linux and if they hacked-what they think are the best tools for hacking and penetration testing, (13) whether respondents knew that one of the six basic principles of hacking ethics is: "All information must be free", (14) whether respondents agreed with the assertion that: "Many hackers show that 'real hackers' use the most used Windows to protect their identity", (15) whether the respondents knew that Kali Linux, a Linux distribution based on Debian, is intended for digital forensics, penetration testing and hacking. In addition to the survey, the paper will also use the scientific method of content analysis, based on which individual definitions of open-source application programs for ethical hacking will be given, including definitions of operating systems from the group of open-source tools, with an emphasis on Kali Linux. The survey was carried out on respondents (sample) who belong to the group of hacking tools users. Also, all types of hackers will be explained theoretically.
Izvorni jezik
Engleski
POVEZANOST RADA
Ustanove:
Veleučilište s pravom javnosti Baltazar Zaprešić,
Visoko učilište Algebra, Zagreb ,
Sveučilište Sjever, Koprivnica