Security Assessment with Kali Linux
This paper discusses the assessment of information system security. When referring to the security of an information system, the authors focus on three major features of the system: confidentiality, integrity and availability. Diverse methods are used to identify existing security weaknesses and security assessment, including the Kali Linux operating system. This work offers a wide-ranging overview of possible uses, benefits and drawbacks. The greatest advantage of implementing this operating system is the considerable collection of various tools for vulnerability assessment and penetration testing, mainly intended for ethical hacking. Further, the paper outlines which present forms of vulnerabilities are best identified by Kali.
 Allen, L., Heriyanto, T., & Ali, S. (2014). Kali Linux - Assuring Security by Penetration Testing, Packt Publishing, 54-64.
 Meucci, M., & Muller, A. (2014). Testing Guide 4.0. OWASP, Web Application Penetration Testing, https://www.owasp.org/images/1/19/OTGv4.pdf
 Kali Linux Tools Listing, https://tools.kali.org/tools-listing
 Quora, https://www.quora.com
 Official Kali Linux Documentation. (2014)., https://docs.kali.org/pdf/kali-book-en.pdf
 Offensive Security: Penetration Testing With Kali Linux, https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf
 Pritchett, W., & De Smet, D (2013). Kali Linux Cookbook. Packt Publishing.
Bánki Közlemények is loyal to open access for academic work. All the original articles and review papers published in this journal are free to access immediately from the date of publication. We don’t charge any fees for any reader to download articles and reviews for their own scholarly use.
The Bánki Közlemények also operates under the Creative Commons Licence CC-BY-NC-ND. This allows for the reproduction of articles, free of charge, for non-commercial use only and with the appropriate citation information. All authors publishing with the Bánki Közlemények accept these as the terms of publication.