vulnerability

BLOCKCHAIN AND BIOMETRICS: CHALLENGES AND SOLUTIONS

Blockchain technology has garnered significant attention in recent years due to its ability to revolutionize conventional processes by providing faster, more secure, and cost-effective solutions. This study explores the symbiotic relationship between blockchain and biometrics, investigating how these technologies can mutually reinforce each other. The research makes a dual contribution: firstly, it comprehensively analyses blockchain and biometrics, highlighting their convergence's potential advantages and obstacles.

Vulnerability of Virtual Assets to Illicit Financial Flows

Over the last few years, virtual assets have become more widespread in the market, which has manifested itself both in the growth of transactions with them and in the rapid growth of the capitalization of the cryptocurrency market. The international community and individual governments have introduced regulations for the virtual asset market, but the degree of transparency remains low. This poses risks of using virtual assets as a tool for various schemes of money laundering or terrorist financing.

Using Kali Linux and Metasploitable for Penetration Testing for Studying Purposes

This paper comprises information about penetration testing methodology, its methods and ways of implementation. The current free and open-source software has been analyzed. It has been done the example of penetration testing in academic field for studying purposes on the base of Kali Linux and Metasploitable2 Linux. This tests and techniques purpose proactive methods of defense and must help to improve security of computer systems and corporate networks.