Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 1156461

How to use the Linux Kali operating system and ethical hacking


Šimović, Vladimir; Varga, Matija; Bevanda, Kristina
How to use the Linux Kali operating system and ethical hacking // Et2er - ekonomija, turizam, telekomunikacje i računarstvo, 3 (2021), 2; 125-132 (međunarodna recenzija, prethodno priopćenje, znanstveni)


CROSBI ID: 1156461 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
How to use the Linux Kali operating system and ethical hacking

Autori
Šimović, Vladimir ; Varga, Matija ; Bevanda, Kristina

Izvornik
Et2er - ekonomija, turizam, telekomunikacje i računarstvo (2670-8930) 3 (2021), 2; 125-132

Vrsta, podvrsta i kategorija rada
Radovi u časopisima, prethodno priopćenje, znanstveni

Ključne riječi
ethical hacking ; Kali Linux hackers ; operating system ; survey

Sažetak
This research paper on "How to use the Linux Kali operating system and Ethical Hacking" will examine: (1) respondents' opinions about hackers, i.e., whether they consider hackers to be moral or immoral people and which hackers are bad or good, (2) whether respondents have ever hacked or not, (3) if respondents have not ever hacked, what was the reason, (4) if respondents have hacked, what was the reason, (5) whether respondents, i.e., the 'respondents' data, have ever been hacked on a computer and / or on social networks, (6) what the reasons for hacking were according to the respondents, (7) whether there is a need to introduce the teaching of ethical hacking in certain subjects in schools and / or in university courses, (8) whether the respondents believe that hackers are malicious people, (9) whether the respondents have heard of the operating system Kali Linux, (10) whether respondents knew that Kali Linux strongly supports open source and that it is free, (11) whether respondents have ever used Kali Linux, (12) whether respondents have used and/or use Kali Linux and if they hacked-what they think are the best tools for hacking and penetration testing, (13) whether respondents knew that one of the six basic principles of hacking ethics is: "All information must be free", (14) whether respondents agreed with the assertion that: "Many hackers show that 'real hackers' use the most used Windows to protect their identity", (15) whether the respondents knew that Kali Linux, a Linux distribution based on Debian, is intended for digital forensics, penetration testing and hacking. In addition to the survey, the paper will also use the scientific method of content analysis, based on which individual definitions of open-source application programs for ethical hacking will be given, including definitions of operating systems from the group of open-source tools, with an emphasis on Kali Linux. The survey was carried out on respondents (sample) who belong to the group of hacking tools users. Also, all types of hackers will be explained theoretically.

Izvorni jezik
Engleski



POVEZANOST RADA


Ustanove:
Veleučilište s pravom javnosti Baltazar Zaprešić,
Visoko učilište Algebra, Zagreb ,
Sveučilište Sjever, Koprivnica

Profili:

Avatar Url Vladimir Šimović (autor)

Avatar Url Matija Varga (autor)

Poveznice na cjeloviti tekst rada:

Pristup cjelovitom tekstu rada vuv.hr reecon.hr

Citiraj ovu publikaciju:

Šimović, Vladimir; Varga, Matija; Bevanda, Kristina
How to use the Linux Kali operating system and ethical hacking // Et2er - ekonomija, turizam, telekomunikacje i računarstvo, 3 (2021), 2; 125-132 (međunarodna recenzija, prethodno priopćenje, znanstveni)
Šimović, V., Varga, M. & Bevanda, K. (2021) How to use the Linux Kali operating system and ethical hacking. Et2er - ekonomija, turizam, telekomunikacje i računarstvo, 3 (2), 125-132.
@article{article, author = {\v{S}imovi\'{c}, Vladimir and Varga, Matija and Bevanda, Kristina}, year = {2021}, pages = {125-132}, keywords = {ethical hacking, Kali Linux hackers, operating system, survey}, journal = {Et2er - ekonomija, turizam, telekomunikacje i ra\v{c}unarstvo}, volume = {3}, number = {2}, issn = {2670-8930}, title = {How to use the Linux Kali operating system and ethical hacking}, keyword = {ethical hacking, Kali Linux hackers, operating system, survey} }
@article{article, author = {\v{S}imovi\'{c}, Vladimir and Varga, Matija and Bevanda, Kristina}, year = {2021}, pages = {125-132}, keywords = {ethical hacking, Kali Linux hackers, operating system, survey}, journal = {Et2er - ekonomija, turizam, telekomunikacje i ra\v{c}unarstvo}, volume = {3}, number = {2}, issn = {2670-8930}, title = {How to use the Linux Kali operating system and ethical hacking}, keyword = {ethical hacking, Kali Linux hackers, operating system, survey} }




Contrast
Increase Font
Decrease Font
Dyslexic Font