How secure are the passwords

Assignment Help Computer Engineering
Reference no: EM132072029

Question: Need 3 paragraphs with one APA citation on the questions below after testing the passwords and you cant use Wikipedia as a reference.

Case Project 11-1: Testing Password Strength

When you test your passwords, don't enter your actual password, use something similar instead. This is just to be on the safe side in case the web site is collecting passwords that users enter to test and adding them to a cracking dictionary. For example, if your password is Password123 try testing something that also has 8 alpha characters that are an actual word, 3 numbers, and 1 uppercase character. You might try testing Settings222 instead.

Case Project 11-1: Testing Password Strength

How strong are your passwords? Various online tools can provide information on password strength, but not all feedback is the same. First, assign the numbers 1 through 3 to three of the passwords you are currently using, and write down the number (not the password) on a piece of paper. Then, enter those passwords into these three online password testing services:

- How Secure Is My Password (howsecureismypassword.net/)

- Password Checker Online (password-checker.online-domain-tools.com

- The Password Meter (www.passwordmeter.com/)

Record next to each number the strength of that password as indicated by these three online tools. Then use each online password tester to modify the password by adding more random numbers or letters to increase is strength. How secure are the passwords? Would any of these tools encourage someone to create a stronger password? Which provided the best information?

Reference no: EM132072029

Questions Cloud

What is delta share price in three years time : What is Delta’s share price in three years time (after the third year of supernormal growth), assuming a required return of 15%?
Explain the dimensions of the asian financial crisis : Explain the dimensions of the Asian financial crisis in 1997, focused in Thailand, what caused it, and how it was triggered
Annum with semiannual compounding : Assume the interest rate is quoted as 5% per annum with semiannual compounding.
Create a gantt chart illustrating the project tasks : Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
How secure are the passwords : Record next to each number the strength of that password as indicated by these three online tools. Then use each online password tester to modify the password.
What were the risks and impact if the implementation failed : What were the implementation requirements? What were the risks and impact if the implementation failed?
Explain why would the write performance of the disk : Explain why would the Write performance of the disk would be better when mounted through the hypervisor than mounted directly to server operating system?
How do you get the standard deviation : How do you get the standard deviation? ' This formula confuses me, can you please do it by step by step.
Approach based on how government reflects public policy : Consider the approach based on how government reflects public policy (provision of care and indirectly by the funding of health care services).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd