Describe tool speed at cracking the passwords

Assignment Help Computer Network Security
Reference no: EM133310315

Lab Report Instructions

Your completed worksheet will illustrate how your team tested password cracking tools and learned much more about the strength of passwords. Explain to the director of IT and the members of the board that the health-care organization's antivirus software will detect password-cracking tools as malware. You will also explain how this impacts the effectiveness of testing security controls like password strength. Through persuasive arguments in your lab report and presentation, help the organization's leaders understand the risks and benefits of using password-cracking tools. If any of the attacks take longer than two to three minutes to guess a password, record the estimated length of time the tool anticipates taking to guess it.

Topics to Address in Your Lab Report Worksheet

1. Compare and contrast the results from the two methods used to crack the user accounts.

Describe the tool's speed at cracking the passwords and draw conclusions that are relevant to the organization's cybersecurity posture.

2. Explain how the tools respond to password complexity.

Explain how strong passwords are constructed and your team's recommendations for the organization.

Explain the four types of character sets used for strong passwords, how many you should use, the general rules for password length, and recommendations for how often passwords should be changed.

3. Discuss the benefit of penetration testing.

Explain what that would entail in the organization and what the team could learn from the testing. Discuss the pros and cons of using the same usernames and passwords on multiple systems.

4. Discuss any ethical or legal considerations for how you would use password cracking tools.

When you have completed your lab report in the worksheet, complete with screenshots to demonstrate what you did, you will work on the presentation for the board of directors.

Reference no: EM133310315

Questions Cloud

Crucial ongoing responsibilities in security management : Is one of the most crucial ongoing responsibilities in security management with strategic, tactical, and operating elements
Normalized set of relations from the model : Fred Jones dealership sells Fords, Hondas, and Toyotas. Write out a normalized set of relations from the model.
Structured english can be expressed in terms : Structured English can be expressed in terms of all of these types EXCEPT? Decision Structuring Graphs. Case Structured Text
Cybersecurity effort in corporate and government agencies : What might be some threats and some advantages to having a joint cybersecurity effort between corporate and government agencies?
Describe tool speed at cracking the passwords : Describe the tool's speed at cracking the passwords and draw conclusions that are relevant to the organization's cybersecurity posture.
Two it security policy documents : Discuss the similarities and differences between the two IT security policy documents
Covert cyber operation designed to promote democracy : Suppose the President of the U.S. wants to conduct a covert cyber operation designed to promote democracy in the fictional country of Drako.
Do the tables exhibit referential integrity : Do the tables exhibit entity integrity? Do the tables exhibit referential integrity?
Characteristics of global nature of botnets : Discuss six specific characteristics of the global nature of botnets

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd