Abstract
Computing technology is becoming more prolific in of user adoption and advancement of technology. We are finding new ways of automation and capturing information. information as they say is power and power is money. Hence, powerful rich targets are bound to be attractive to many hackers. The rise in cybercrime and the ransom attack of the Southern US gas pipeline highlight the need for securing our computer and network systems. one security method employed by information Systems Security professionals is hacking networks with penetration testing tools. This paper reviews and analyzes 18 different tools covering 6 different areas. The analysis ends with a discussion of how businesses and security professionals can use these tools to help prevent attacks, maintain the integrity of the organization's cyber space, and keep costs down.
| Original language | American English |
|---|---|
| Title of host publication | International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9781665442312 |
| DOIs | |
| State | Published - Feb 11 2021 |
| Event | 2021 International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021 - Cape Town, South Africa Duration: Dec 9 2021 → Dec 10 2021 |
Publication series
| Name | International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021 |
|---|
Conference
| Conference | 2021 International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021 |
|---|---|
| Country/Territory | South Africa |
| City | Cape Town |
| Period | 12/9/21 → 12/10/21 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
Scopus Subject Areas
- Electrical and Electronic Engineering
- General Computer Science
- Energy Engineering and Power Technology
Disciplines
- Computer Sciences
Keywords
- cybersecurity
- information systems security
- Kali Linux
- penetration tools
- testing
Fingerprint
Dive into the research topics of 'Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools: A Survey of Hacking Tools'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver