Why does a change of case help make a stronger password

Assignment Help Computer Engineering
Reference no: EM131299186

Password testing

Let's evaluate the strength of one of your current passwords. Just because an attacker steals your password database does not mean he automatically knows your password. He still has to crack it. Creating a strong password can make it impractical for an attacker to crack your password.

Several password strength tools exist online. These tools can help you understand the differences between strong and weak passwords.
Directions

1. Go to https://www.passwordmeter.com/
2. Enter one of the passwords you use on a regular basis with a minor change.
3. Click Submit.
4. Take a screenshot.
5. Take note of the problems with your password (e.g., a number sequence and a dictionary word).
6. Try entering a password you might actually use that you think is strong.
7. Take a screenshot of the results.

Note: Weak passwords are typically easier to remember. However, it is possible to create a strong password that is fairly easy to remember.

8. Go to https://rumkin.com/tools/password/passchk.php

9. Click Submit several times and watch the passwords at the top of the page change. These are samples of good passwords that might be easy to remember.

10. Take a screenshot.

Submit your Screenshots and answer the following questions:

• Why do special characters (e.g., @#$%^&*) make passwords difficult to crack?
• Why does a change of case help make a stronger password?
• How did you choose the password you currently have?
• Could others follow the same logic and choose a similar password?
• Do you use the same password for multiple accounts? Why would this be a security risk?

Your well-written paper should meet the following requirements:

• Be three pages in length
• Contain an illustrative table or a diagram created from properly cited external references
• Include two credible external references in addition to the textbook
• Your paper must follow APA style guidelines, as appropriate .
• Two citations for every paragraph.
• Not plagiarized ( we check that with turnitin.com).

Reference no: EM131299186

Questions Cloud

Write a program that randomly fills an array of size fifty : Write a program that randomly fills an array of size 50 with integer values from 1 to 20 inclusively. You will need to create a global constant for the size of the array; this will be used for declaring and accessing the contents of the array.
Determine at what frequencies output sidebands are located : Determine at what frequencies the output sidebands of Figure are located. Are these sidebands or harmonics?
Make a dog class that extends pet and give the dog : Make a Dog class that extends Pet and give the dog to a second person in main. Have the dog and cat interact as described below. You will probably need to add some new methods.
Write a newspaper article that summarizes the design : Write a newspaper article that summarizes the design and the findings of the study. (Be sure to include statistical aspects, such as observational study versus experiment and any randomization used. News accounts often neglect these facts.)
Why does a change of case help make a stronger password : Why does a change of case help make a stronger password? How did you choose the password you currently have? Could others follow the same logic and choose a similar password?
Volume of a nation exports and imports : Please be sure both are half a page at minimum. Thank you. Q1: What determines the volume of a nation's exports and imports? Explain in detail.
Compute tom tax shield from the mortgage interest : RES3200 Residential Underwriting & Valuation Assignment. Tom paid $10k in mortgage interest and $4k in property taxes last year. His average tax rate is 20%, his marginal tax rate is 35%. Compute Tom's tax shield from the mortgage interest and prop..
A linear function of the input frequency difference : For the PFD of Figure, determine whether or not the average value of QA - QB is a linear function of the input frequency difference.
Justify the threat cyber terrorism poses to society : Justify the threat cyber terrorism poses to society. Provide examples to support your justification. Defend or oppose the legal processes of civil law used to resolve cases against computer crimes offenders.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What your relationship would be like with the technical

What instances of collaberation and communications do you and the technical staff explore.

  1 construct a truth table for the following boolean

1. construct a truth table for the following boolean expressionsa abc abcb abc abc abcc abc bc2. simplify the

  Would you create multilingual capabilities for application

Would you create multilingual capabilities for any application that would be available to non-English speaking people? Think about Web sites that exist today.

  How to generate paper for pair of public or private rsa key

How to generate paper for a pair of public or private RSA keys? The high-class reporter for foreign affairs learned about asymmetric cryptography, and proposed to security team at the paper to generate for a pair of public or private RSA keys.

  Write down a c function that adds the values

Write a C function that adds the values of all elements in a two-dimensional array that is passed to the function, suppose that the array is an array of double-precision numbers having 4 rows and 5 columns.

  How to designs a communincation methodology

What if someone creats a communincation methodology that does not comply with OSI but is compatable with the application layer and the physical layer. What will be problems if any? in both Local network and in Internetworking.

  Find three separate on-line resources for perl

How might any or all of the resources you've cited help solve the problem mentioned in step 1 of this assignment?

  Make ajax programming based solutions to write a code

In the AJAX scripts you create, refer to the DSN datasource as flamingo. although its not in your own folder or directory, it has been set up as a SYSTEM DSN, so your AJAX script will have access to it.

  The pros and cons of using sessions

What are the advantages and disadvantages of using cookies? What are the advantages and disadvantages of using sessions? Is one more secure than the other and why?

  What do you mean by sensitivity analysis how would you use

what is a sensitivity analysis? how would you use it in planning for future expansions? what role does this kind of

  Questionthis is compulsory to write a report on

questionthis is compulsory to write a report on object-oriented systems. the report must focus on the following systems

  The signal propagates 250 million meters per second along

two stations exchange packets of 100 bits using a link with 2800 bps transfer rate. the signal propagates 250 million

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd