Threat and vulnerability penetration testing: Linux
A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, p...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Taiwan Academic Network Management Committee
2014
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/63079/ http://dx.doi.org/10.6138/JIT.2014.15.3.02 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
id |
my.utm.63079 |
---|---|
record_format |
eprints |
spelling |
my.utm.630792017-06-14T03:07:40Z http://eprints.utm.my/id/eprint/63079/ Threat and vulnerability penetration testing: Linux Setiawan, Deris Abdullah, Abdul Hanan Idris, Mohd. Yazid QA75 Electronic computers. Computer science A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not. Taiwan Academic Network Management Committee 2014 Article PeerReviewed Setiawan, Deris and Abdullah, Abdul Hanan and Idris, Mohd. Yazid (2014) Threat and vulnerability penetration testing: Linux. Journal of Internet Technology, 15 (3). pp. 333-342. ISSN 1607-9264 http://dx.doi.org/10.6138/JIT.2014.15.3.02 DOI:10.6138/JIT.2014.15.3.02 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Setiawan, Deris Abdullah, Abdul Hanan Idris, Mohd. Yazid Threat and vulnerability penetration testing: Linux |
description |
A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not. |
format |
Article |
author |
Setiawan, Deris Abdullah, Abdul Hanan Idris, Mohd. Yazid |
author_facet |
Setiawan, Deris Abdullah, Abdul Hanan Idris, Mohd. Yazid |
author_sort |
Setiawan, Deris |
title |
Threat and vulnerability penetration testing: Linux |
title_short |
Threat and vulnerability penetration testing: Linux |
title_full |
Threat and vulnerability penetration testing: Linux |
title_fullStr |
Threat and vulnerability penetration testing: Linux |
title_full_unstemmed |
Threat and vulnerability penetration testing: Linux |
title_sort |
threat and vulnerability penetration testing: linux |
publisher |
Taiwan Academic Network Management Committee |
publishDate |
2014 |
url |
http://eprints.utm.my/id/eprint/63079/ http://dx.doi.org/10.6138/JIT.2014.15.3.02 |
_version_ |
1643655611550793728 |