Cracking password management protocols

Assignment Help Computer Network Security
Reference no: EM13862584

Q1 - Context and environment Collapse

In a pervasive computing environment, context plays an important role. Services are provided in a smart way based on the surrounding conditions (i.e., contextual attributes). From a security perspective, security services such as access control have to reflect this fact and be context-aware. With that in mind, consider the following scenario:

Alice, a security researcher, thinks that the role-based access control (RBAC) model, along with all traditional access control models, is not suitable. Bob thinks the opposite. Bob thinks RBAC, for instance, could be used to grant/deny permissions in such an environment.

For this Discussion, you will consider the current access control models you have seen so far and align yourself with either Alice or Bob.

To complete this Discussion:

Post: Take a position in which you agree with either Alice or Bob as described in the example, or if you are somewhere in between. Evaluate the suitability of role-based access control (RBAC) for accommodating contextual information in the access control decision-making process. Identify and describe any obstacles, and explain your solutions for them. Given the access policy, evaluate whether or not Extensible Access Control Markup Language (XACML) could be used to express the contextual attributes.

Q2 - Cracking password management protocols Collapse

One of the best ways to evaluate the security of a password management protocol is to try to crack it yourself. Fortunately, you do not need to be an expert hacker to do this. A number of password cracking tools are available for free online.

For this Discussion, you will choose one example of a password management protocol (this includes password creation, storage, revocation, etc.) in any product suite you have used (e.g., Microsoft, Apple, Adobe, etc.) and discuss its security or insecurity with your colleagues. Then you will install one of the available cracking tools to see whether you can crack this system and share your experience with your colleagues.

To complete this Discussion:

Post: Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol. Install a password-cracking tool and try to crack that product. Then share your experience with your colleagues using screenshots. Recommend ways this protocol could be improved, if possible, and explain the results of the improvements you recommended.

Reference no: EM13862584

Questions Cloud

Moving and renaming files and folders are all function of : Copying, moving, and renaming files and folders are all functions of _
Why is marketing research at the core of any marketing plan : Why is marketing research at the core of any Marketing Plan? Assuming you have started to research/think about your team Marketing Plan for the Droneport in Country X; what kind of Marketing research are you planning to use? Have you started g..
Pros and cons of main types of business organizations : Discuss the pros and cons of three main types of business organizations (sole proprietorship, partnerships, and corporations) and determine which would be the best type for the Cardigans.
Calculate the load on each transformer : Two single-phase 33 kV/11 kV transformers rated at 400 kVA and 500 kVA are connected in parallel to supply 800 kVA at a pf of 0.85 lagging. The transformers have percent impedances of 5.38% and 6.1% respectively. Calculate the load on each transfo..
Cracking password management protocols : Identify and describe any obstacles, and explain your solutions for them. Given the access policy, evaluate whether or not Extensible Access Control Markup Language (XACML) could be used to express the contextual attributes.
Compare and contrast frameworks : Compare and contrast the 3 selected frameworks
Calculate the probability of zero patients in the system : Calculate the probability of zero patients in the system (PO), the probability of one patient (P I), and the probability of two or more patients simultaneously arriving during the night shift.
Compare and contrast public and in-house cas : Compare and contrast public and in-house CAs
Differences between a process and a function : Explain the differences between a process and a function. In your paper, persuade the reader on why this information is important to know

Reviews

Write a Review

Computer Network Security Questions & Answers

  Examine common web application vulnerabilities and attacks

Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Security issues

A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation.

  What is meant by multi-modal biometrics for access control

What is meant by "Multi-modal Biometrics" for access control. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics

  Assignment on analyzing a social policy

Assignment on Analyzing a Social Policy

  What is cybersquatting

What is cybersquatting? (Chapter 4 MIS2) What does spoofing a website mean? (Class or online) What can a business do to prevent this from happening to it? Short answer (1 -2 paragraphs)

  How does a security framework assist or affect

How does a security framework assist or affect in the design and implementation of a security infrastructure? Detail information security governance and what organizations and personnel will use it

  Topographical layout of the current and planned network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included..

  What is computer security

Computer security is integral part of any organization, if any organization hasstarted working in, immediately it should start Computer security for its systemif they want to protect their system for future.

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Describe and discuss the potential impact

Develop and ratify borderless cybersecurity policies that can be enforced through international litigation and accepted international sanctions via the United Nations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd