![Open Access](https://jit.ndhu.edu.tw/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://jit.ndhu.edu.tw/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Threat and Vulnerability Penetration Testing: Linux
Abstract
A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internetworking capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not.
Keywords
Attack; Penetration; Intrusion detection; Data set
Citation Format:
Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris, "Threat and Vulnerability Penetration Testing: Linux," Journal of Internet Technology, vol. 15, no. 3 , pp. 333-342, May. 2014.
Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris, "Threat and Vulnerability Penetration Testing: Linux," Journal of Internet Technology, vol. 15, no. 3 , pp. 333-342, May. 2014.
Refbacks
- There are currently no refbacks.
Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314 E-mail: jit.editorial@gmail.com