Hands-On Project – Password testing (100 points)
Let’s evaluate the strength of one of your current passwords. Just because an attacker steals your password database does not mean he automatically knows your password. He still has to crack it. Creating a strong password can make it impractical for an attacker to crack your password.
Several password strength tools exist online. These tools can help you understand the differences between strong and weak passwords.
Directions:
- Go to http://www.passwordmeter.com/
- Enter one of the passwords you use on a regular basis with a minor change.
- Click Submit.
- Take a screenshot.
- Take note of the problems with your password (e.g., a number sequence and a dictionary word).
- Try entering a password you might actually use that you think is strong.
- Take a screenshot of the results.
Note: Weak passwords are typically easier to remember. However, it is possible to create a strong password that is fairly easy to remember. - Go to http://rumkin.com/tools/password/passchk.php
- Click Submit several times and watch the passwords at the top of the page change. These are samples of good passwords that might be easy to remember.
- Take a screenshot.
Submit your screenshots and answer the following questions:
- Why do special characters (e.g., @#$%^&*) make passwords difficult to crack?
- Why does a change of case help make a stronger password?
- How did you choose the password you currently have?
- Could others follow the same logic and choose a similar password?
- Do you use the same password for multiple accounts? Why would this be a security risk?
Your well-written paper should meet the following requirements:
- Be 3-4 pages in length, not including the cover and reference pages
- Contain an illustrative table or a diagram created from properly cited external references
- Include two credible external references in addition to the textbook
- Formatted according to Saudi Electronic University and APA writing guidelines.
There is SafeAssign Plagiarism Checker, If your score is above 25%, you will want to edit your assignment before submitting it for grading.
course name: CS664: Cyber Security Defense and Countermeasures
Course Materials: Easttom, W. (2018). Network defense and countermeasures (3rd ed.). Upper Saddle River, NJ: Pearson Education. Print ISBN13: 9780789759962, eText ISBN13: 9780134893099
Recommended
- Chapter 13: Security Standards in Network Defense and Countermeasures
- Chapter 13 PowerPoint slides in Network Defense and Countermeasures
- Almehmadi, A., & El-Khatib, K. (2017). On the possibility of insider threat prevention using intent-based access control (IBAC). IEEE Systems Journal, 11(2), 373-384.
- Kalyan, C. H. (2017). Various biometric authentication techniques: A review. Journal of Biometrics and Biostatistics, 8(5), 371. Retrieved from https://www.omicsonline.org/open-access/various-bi…
- Wambler, S. (n.d.). Implementing security access control (SAC). [Website]. Retrieved from http://www.agiledata.org/essays/accessControl.html
Looking for a solution written from scratch with No plagiarism and No AI?
WHY CHOOSE US?
We deliver quality original papers |
Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected |
Free revisions |
We offer our clients multiple free revisions just to ensure you get what you want. |
Discounted prices |
All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount |
100% originality |
We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI |
On-time delivery |
We will deliver your paper on time even on short notice or short deadline, overnight essay or even an urgent essay |