Меню
No. 1 (22) - 2024 / 2024-03-31 / Number of views: 108
Authors
Keywords
Link to DOI:
How to quote
This article discusses and describes in detail one example of an information security audit. The work was done in practice using applications. The main focus for audit tools was on the Kali Linux operating system and the study of their important role in ensuring network security in the modern information society. In addition, the article provides an overview of the key stages of an information security audit, starting from defining the goals of the study to analyzing the results and formulating recommendations. The main tools and technologies used in the audit process are also considered, which contributes to expanding knowledge in the field of cybersecurity and improving the quality of audit. The article additionally describes an effective example for those who are interested in the field of information security for research work.
Keywords. Metasploit Framework, Meterpreter, audit, information security, scanning, attack.