Threat and vulnerability penetration testing: Linux

A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, p...

Full description

Saved in:
Bibliographic Details
Main Authors: Setiawan, Deris, Abdullah, Abdul Hanan, Idris, Mohd. Yazid
Format: Article
Published: Taiwan Academic Network Management Committee 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/63079/
http://dx.doi.org/10.6138/JIT.2014.15.3.02
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.63079
record_format eprints
spelling my.utm.630792017-06-14T03:07:40Z http://eprints.utm.my/id/eprint/63079/ Threat and vulnerability penetration testing: Linux Setiawan, Deris Abdullah, Abdul Hanan Idris, Mohd. Yazid QA75 Electronic computers. Computer science A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not. Taiwan Academic Network Management Committee 2014 Article PeerReviewed Setiawan, Deris and Abdullah, Abdul Hanan and Idris, Mohd. Yazid (2014) Threat and vulnerability penetration testing: Linux. Journal of Internet Technology, 15 (3). pp. 333-342. ISSN 1607-9264 http://dx.doi.org/10.6138/JIT.2014.15.3.02 DOI:10.6138/JIT.2014.15.3.02
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Setiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
Threat and vulnerability penetration testing: Linux
description A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not.
format Article
author Setiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
author_facet Setiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
author_sort Setiawan, Deris
title Threat and vulnerability penetration testing: Linux
title_short Threat and vulnerability penetration testing: Linux
title_full Threat and vulnerability penetration testing: Linux
title_fullStr Threat and vulnerability penetration testing: Linux
title_full_unstemmed Threat and vulnerability penetration testing: Linux
title_sort threat and vulnerability penetration testing: linux
publisher Taiwan Academic Network Management Committee
publishDate 2014
url http://eprints.utm.my/id/eprint/63079/
http://dx.doi.org/10.6138/JIT.2014.15.3.02
_version_ 1643655611550793728