Cyber Security on a Budget: Tool Identification and Constraint Considerations

Abstract

this multifaceted project has investigated a number of security-related instruments in order to build a set of recommended tools for Information Technology practitioners constrained by minimal resources. Criteria for tool selection were identified, including operational complexity and reusability, to refine the possibilities found to a workable number of options. This list was largely informed by several available well-known platforms and suites; a secondary goal was to define a toolkit suitable for classroom instruction. Initial investigation led to the identification of the Raspberry Pi and Kali Linux. This combination provided a very large range of options and a portable/mobile capability. The main challenges to this project revolved around two goals: (1) locating tools that had little to no cost, and (2) identification of tools that are both easy to learn and suitable for those looking to create more secure network and host configurations with limited time, expertise, and financial resources

    Similar works