Analysis of cyber-attacks through simulation
Keywords:Simulation, Technology, Institutions, Cyber systems
Nowadays, the development of information technology has brought radical changes in every aspect of people's lives and this has made our lives have a lot of access to information. Users should be very careful when using social networks, various applications and navigating the Internet world because the risk of cyber-attacks by irresponsible persons with malicious intentions is very frequent. This paper aims to provide the necessary information for cyber-attacks, where we will use for simulation tools from the MetaSploit library which is a framework that makes hacking simpler and is also an essential tool for many attackers and defender.
Rahalkar, S. (2017). Metasploit for Beginners. UK.
Basholli, F., (2022). Cyber warfare, a new aspect of modern warfare. International Scientific Journal Security & Future, Publisher: Scientific Technical Union of Mechanical Engineering Industry-4.0, 72-75
Malware, 2019. http://cyberalbania.al/?page_id=632.
Johnson, M., (2021). The Role of Education in Cybersecurity: A Systematic Literature Review. International Journal of Cybersecurity Education, Research and Practice.
Basholli, F., Daberdinİ, A., & Basholli, A. (2023). Detection and prevention of intrusions into computer systems. Advanced Engineering Days (AED), 6, 138-141.
Denial-of-service attack, (2019). https://en.wikipedia.org/wiki/Denial-of-service_attack.
Hyka, D., & Basholli, F. (2023). Health care cyber security: Albania case study. Advanced Engineering Days (AED), 6, 121-123.
Phishing, (2019) https://sq.wikipedia.org/wiki/Phishing.
Smith, J., Johnson, A., & Brown, L. (2022). The Role of Education in Cyber Hygiene: A Systematic Review. International Journal of Cybersecurity Education, Research, and Practice
Daberdini, A., Basholli, F., Metaj, N., & Skenderaj, E. (2022). Cyber security in mail with Fortiweb and Fortinet for companies and institutions. Advanced Engineering Days (AED), 5, 81-83.