On the review and setup of security audit using Kali Linux

The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulne...

Full description

Bibliographic Details
Main Authors: Gunawan, Teddy Surya, Lim, Muhammad Kasim, Zulkurnain, Nurul Fariza, Kartiwi, Mira
Format: Article
Language:English
English
Published: IAES 2018
Subjects:
Online Access:http://irep.iium.edu.my/63554/
http://irep.iium.edu.my/63554/
http://irep.iium.edu.my/63554/
http://irep.iium.edu.my/63554/7/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux_SCOPUS.pdf
http://irep.iium.edu.my/63554/8/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux.pdf
id iium-63554
recordtype eprints
spelling iium-635542018-08-28T02:23:47Z http://irep.iium.edu.my/63554/ On the review and setup of security audit using Kali Linux Gunawan, Teddy Surya Lim, Muhammad Kasim Zulkurnain, Nurul Fariza Kartiwi, Mira TK7885 Computer engineering The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulnerabilities of a system can be identified and simulated attack can be launched to determine how severe the vulnerabilities are. This paper reviewed some of the security concepts, including penetration testing, security analysis, and security audit. On the other hand, Kali Linux is the most popular penetration testing and security audit platform with advanced tools to detect any vulnerabilities uncovered in the target machine. For this purpose, Kali Linux setup and installation will be described in more details. Moreover, a method to install vulnerable server was also presented. Further research including simulated attacks to vulnerable server on both web and firewall system will be conducted. IAES 2018-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/63554/7/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux_SCOPUS.pdf application/pdf en http://irep.iium.edu.my/63554/8/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux.pdf Gunawan, Teddy Surya and Lim, Muhammad Kasim and Zulkurnain, Nurul Fariza and Kartiwi, Mira (2018) On the review and setup of security audit using Kali Linux. Indonesian Journal of Electrical Engineering and Computer Science, 11 (1). pp. 51-59. ISSN 2502-4752 http://www.iaescore.com/journals/index.php/IJEECS/ 10.11591/ijeecs.v11.i1.pp51-59
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
topic TK7885 Computer engineering
spellingShingle TK7885 Computer engineering
Gunawan, Teddy Surya
Lim, Muhammad Kasim
Zulkurnain, Nurul Fariza
Kartiwi, Mira
On the review and setup of security audit using Kali Linux
description The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulnerabilities of a system can be identified and simulated attack can be launched to determine how severe the vulnerabilities are. This paper reviewed some of the security concepts, including penetration testing, security analysis, and security audit. On the other hand, Kali Linux is the most popular penetration testing and security audit platform with advanced tools to detect any vulnerabilities uncovered in the target machine. For this purpose, Kali Linux setup and installation will be described in more details. Moreover, a method to install vulnerable server was also presented. Further research including simulated attacks to vulnerable server on both web and firewall system will be conducted.
format Article
author Gunawan, Teddy Surya
Lim, Muhammad Kasim
Zulkurnain, Nurul Fariza
Kartiwi, Mira
author_facet Gunawan, Teddy Surya
Lim, Muhammad Kasim
Zulkurnain, Nurul Fariza
Kartiwi, Mira
author_sort Gunawan, Teddy Surya
title On the review and setup of security audit using Kali Linux
title_short On the review and setup of security audit using Kali Linux
title_full On the review and setup of security audit using Kali Linux
title_fullStr On the review and setup of security audit using Kali Linux
title_full_unstemmed On the review and setup of security audit using Kali Linux
title_sort on the review and setup of security audit using kali linux
publisher IAES
publishDate 2018
url http://irep.iium.edu.my/63554/
http://irep.iium.edu.my/63554/
http://irep.iium.edu.my/63554/
http://irep.iium.edu.my/63554/7/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux_SCOPUS.pdf
http://irep.iium.edu.my/63554/8/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux.pdf
first_indexed 2023-09-18T21:30:08Z
last_indexed 2023-09-18T21:30:08Z
_version_ 1777412455876526080