Ethical hacking tools as a resource for the detection of vulnerabilities in information systems

Keywords: Ethical hacking, vulnerabilities, information systems

Abstract

The objective of this research is to determine the level of application of ethical
hacking within companies in the City of Cabimas in Zulia State. In order to provide the
necessary theoretical support, the postulates of Astudillo (2013), Benchimol (2011),
Rault and others (2015) were used. The present study was classified as descriptive, with
a non-experimental-transversal design. The population consisted of 22 IT managers,
systems and network administrators from local companies. All subjects were used
as a sample. The technique used for data collection was the survey through a closed
questionnaire with a Likert-type scale of 5 response alternatives, which was subjected
to content validity by expert judgment. Reliability was calculated with Cronbach's
Alpha coefficient, obtaining a value of 0.935, considered highly reliable. Descriptive
statistics were used for data analysis. A high presence was obtained in the use of
ethical hacking tools such as ping sweepers, port scanners, vulnerability analyzers
and Linux distributions (Kali). It was concluded that organizations should promote
the use of these tools to protect their information assets, networks and systems, given
the existence of so-called cybercriminals. Likewise, awareness must be created in the
common citizen to safeguard sensitive information about the services they use.

Downloads

Download data is not yet available.

References

Arias, Fidias. (2012). El proyecto de Investigación. Introducción a la metodología
científica. (6ta. Edición). Editorial Episteme. Caracas, República Bolivariana de
Venezuela. Pp. 143.

Astudillo, Karina (2013). Hacking ético 101. Cómo hackear profesionalmente en
21 días o menos.(s/e).

Benchimol, Daniel (2011). Hacking desde cero. (1ª Edición). Editorial Fox Andina.
Buenos Aires, Argentina.

Diario El estímulo (2017). Denuncian supuesto hackeo de página de organismo
electoral de Colombia desde Venezuela. Artículo en línea. Consultado el
12/05/2018. Disponible en: http://elestimulo.com/blog/colombia-asegura-quepretendian-
hackear-pagina-de-la-registraduria-desde-venezuela/Denuncian
supuesto hackeo de página de organismo electoral de Colombia desde Venezuela

Hernández, Roberto; Fernández, Carlos; y Baptista, Pilar. (2010). Metodología de
la Investigación. Editorial Mc. Graw Hill. México.

Hurtado Jaqueline. (2010). Metodología de la investigación Holística. Fundación
Sypal. Caracas Venezuela.

Kali Linux. (2018). Sitio Oficial. Disponible en: https://www.kali.org/
López, Jair (2018). 5 hackeos que sacudieron al mundo. Artículo en línea
Recuperado de: http://www.elfinanciero.com.mx/tech/hackeos-que-sacudierona-
empresas-en-2014

Rault Raphael,Schalkwijk Laurent, Acissi, Agé Marion, Crocfer Nicolas, Crocfer
Robert, Dumas David, Ebel Frank, Fortunato Guillaume, Hennecart Jérôme,

Lasson Sébastien (2015). Seguridad informática. Hacking ético. Conocer el ataque
para una mejor defensa (3a. Edición). Ediciones ENI. Barcelona, España.
Published
2023-06-06
How to Cite
Serra, L., Figueroa, C., Sánchez, R., Marín, E., & Gutiérrez, A. (2023). Ethical hacking tools as a resource for the detection of vulnerabilities in information systems. Impacto Científico, 18(1), 65-80. Retrieved from https://produccioncientificaluz.org/index.php/impacto/article/view/40285