EconPapers    
Economics at your fingertips  
 

Security Testing With Python Scripts

Frida Zisko () and Alma Hyra ()
Additional contact information
Frida Zisko: Department of Information Business, Mediterranean University of Albania
Alma Hyra: Department of Information Technology, Mediterranean University of Albania

Smart Cities and Regional Development (SCRD) Journal, 2023, vol. 7, issue 2, 77-84

Abstract: Cyber security is one of the main issues that is discussed today everywhere in the world. The development of technology has grown rapidly and it is important that this development should be done simultaneously with the increase in security. When we talk about the network, we must also consider its Security. On the other hand, Python is a language which, especially in recent times, has received a great development and now we can say that it enjoys such a wide community. Our goal in this article is the advantages that this programming language offers in cases of cyber security issues. It has everything that cyber security professionals need to protect against cyber vulnerabilities and threats. It allows developers to do anything that relates to cyber security by detecting threats to system fixes. Python is a high-level, general-purpose, interpreted programming language for analyzing small networks. So, the implications of the study are for cybersecurity professionals and developers. They use the NetworkX grid tools imported into python. NetworkX provides many functions and generation facilities to read and write graphics in many formats. By analyzing these network nodes graphs, are identified the nodes that can be bad. With Python scripts, you can scan ports and compromised device. In order to achieve this, we have obtained two concrete dataset which were obtained respectively from a public and a private network. After analyzing the graphs, the weaknesses of the network and unidentified devices in the network are identified, creating the possibility of taking appropriate measures to protect against cyber-attacks.

Keywords: network traffic; NetworkX; malicious device (search for similar items in EconPapers)
JEL-codes: O35 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://scrd.eu/index.php/scrd/article/view/402/367 (application/pdf)
https://scrd.eu/index.php/scrd/article/view/402 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:pop:journl:v:7:y:2023:i:2:p:77-84

Access Statistics for this article

More articles in Smart Cities and Regional Development (SCRD) Journal from Smart-EDU Hub, Faculty of Public Administration, National University of Political Studies & Public Administration Contact information at EDIRC.
Bibliographic data for series maintained by Professor Catalin Vrabie ().

 
Page updated 2025-03-19
Handle: RePEc:pop:journl:v:7:y:2023:i:2:p:77-84