


According to the reviews, BackTrack can be easily used in the commerce environments because of the open access to the tools, and BackTrack is “good for web application assessment”, and it is “perfect for penetration testing” (Ali & Heriyanto, 2011, p. Linux managers and developers focus on collecting the feedback on BackTrack 4.0 and BackTrack 5.0. BackTrack is appropriate to be used in professional fields. Thus, the effectiveness of identifying vulnerabilities and overcoming these problems increases. 24).īackTrack operates with the focus on penetration testing approaches which are supported with vulnerability assessment methods. 12).Īs a result, BackTrack can be used for gathering information, checking network activities, identifying vulnerabilities, auditing specific web application, maintaining the access to the system and network, and conducting penetration testing (Simpson, 2012, p. The purpose of BackTrack is to provide complete tools for the effective penetration testing process (Ali & Heriyanto, 2011, p. Description and Purpose of BackTrackīackTrack is the Linux security distribution or the penetration testing suite the latest version of which was released in 2012. The purpose of this proposal is to describe and evaluate the software and present its purpose and benefits supported with credible evidence. That is why, the BackTrack software suite can be discussed as an effective choice to meet the company’s requirements.

The company uses a mix of Microsoft and *NIX technologies in order to support the corporate network.

Advanced Research’s main requirements to the security testing software are the ability to identify vulnerabilities, prevent attacks by unauthorized sources and the cost-effectiveness of the security project. With a large number of downloads, it has turned into the most broadly embraced entrance testing structure in presence and is utilized by the security group everywhere throughout the world.Advanced Research is an actively developing medical research company, and it needs to test and promote the corporate network security in order to avoid cyber attacks and losses of the corporate information. Support for Live CD and Live USB usefulness enabled clients to boot BackTrack specifically from compact media without requiring establishment, however perpetual establishment to hard circle and system was likewise an alternative.īackTrack initially began with before forms of Live Linux disseminations called Whoppix, IWHAX, and Auditor.When it was at first created, Back|Track was intended to be an across the board Live CD to be utilized on security reviews and was particularly made to not leave any leftovers of itself on the framework. BackTrack furnished clients with simple access to a thorough and expansive gathering of security-related instruments running from port scanners to Security Audit.
