User and system passwords

Assignment Help Basic Computer Science
Reference no: EM13839930

Application: Password Scan

User and system passwords, in theory, should be relatively easy to remember and be hard to guess (which includes avoiding common words susceptible to a "dictionary" attack). Many sites require that passwords conform to rules such as:

  • minimum length (usually at least 6 or 8 characters)
  • include both upper and lower case letters
  • include at least one digit
  • include at least one special characters ($, #, @, %, !, etc.)

Constructing such a password that is reasonably easy to remember is generally not difficult. For example, here are some passwords that are not dictionary words and that follow the rules mentioned above:

  • SprBwl#44
  • Dinner@8
  • $64Dollars
  • NY.Mets.1969

Passwords should never contain character strings associated with the user, such as birth dates/years, personal names, addresses, user IDs, or Social Security numbers. Which of the following passwords are not allowable under these rules? (Assume an 8-character minimum length.) Explain why each does not meet the required criteria.

  • BigDog
  • Christmas2010
  • JohnSmith.1963
  • Tea4Two
  • bQj3&&5k
  • 12345678
  • aaaaaaaa
  • password
  • banana
  • Baltimore
  • 214MainStreet
  • June15-1974
  • RollingStones

Now create five passwords that look very different but that use the above rules. Some sites put restrictions on passwords, such as:

  • No spaces
  • No special characters
  • Maximum length (usually 8 characters)

Additionally, some systems prevent the reuse of old passwords or impose other restrictions such as maximum password lifetime (often 30 or 90 days). As a result, you cannot have just one password that you use everywhere. Aside from the risk of using the same password at multiple sites, write a 1- to 2-page paper that proposes a strategy that a user could follow to manage frequently changing passwords across a variety of sites.In APA Format.

Reference no: EM13839930

Questions Cloud

Advertise a government program or service : Prepare a 700- to 1,050-word paper analyzing the website to determine if it provides useful information for the public (doing the public good) or if its purpose is to advertise a government program or service (doing well for government)
Effects on the accounts and financial statements : Illustrate the effects on the accounts and financial statements of each of the preceding transactions - plan was approved by the stockholders
Is chipotle a socially responsible organization : Is Chipotle a socially responsible organization? Why or why not? Some would argue that Chipotle is not socially responsible because its menu is full of very high-fat, high-calorie items, which encourages obesity. How would you respond to such criti..
Focus of the final exam : The purpose of the Final Exam is to assess your understanding of the main statistical concepts covered in this course and to evaluate your ability to critically review a quantitative research article.
User and system passwords : Application: Password Scan User and system passwords, in theory, should be relatively easy to remember and be hard to guess (which includes avoiding common words susceptible to a "dictionary" attack). Many sites require that passwords conform to rule..
What is the childs usual way of communicating feelings : What is the childs usual way of communicating feelings
Discuss the stages of the counseling process : When using interventions with children and adolescents, the developmental level of the client is an important consideration. Discuss the effect of developmental levels on both the choice of intervention and the potential effectiveness of an interv..
Discuss how peta could respond to bills two arguments : Using the relevant principles of contract law and cases, discuss how Peta could respond to Bill's two arguments AND give your conclusion on the likely outcome of this case.
Commandments of computer ethics : Commandments of Computer Ethics

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a brief statement on how you would address components

Assume that a security model is needed for the protection of information i your class. Using the CNSS model examine each of the cells and write a brief statement on how you would address the components represented in that cell.

  Creation of a base geometric class

The lab will require the creation of a base geometric class, called Shape, and two sub classes, Circle and Rectangle, that are derived public from the class Shape.

  Compare and contrast their relative strengths and weaknesses

The system to be developed is intended to be operational in a small market firm or small business firm or even in home usage. Familiar examples might include an income tax preparation package by a small tax consulting firm.

  Clarify the difference between vulnerabilities and threats

Summarize the primary vulnerabilities and potential threats that exist for GITI related to the practice of storing sensitive data on laptops. Use your answer to clarify the difference between vulnerabilities and threats.

  Evaluates and makes recommendations to address

Evaluates and makes recommendations to address differences in ethical codes of information technology conduct in different cultures in a very clear and detailed way.

  Popular day-trip destination for local families

Two large international holiday companies have been planning to build hotel and leisure facilities for tourists on one of the island's beaches, which is also a popular day-trip destination for local families.

  Write and explain briefly three guidelines for sound policy

Write and explain briefly three guidelines for sound policy, as stated by Bergeron and Bérubé. Are policies different from standards? In what way? Are policies different from procedures? In what way?

  Use strong mathematical induction to prove

Use (Weak) Mathematical Induction to prove that for n ? 0, an = 4 · 3^n

  Give a recursive definition for the language

Give a recursive definition for the following language over the alphabet {a, b} The language AA of all words containing the substring aa

  Allocate new memory and release unneeded old memory

During an exec call in Minix, it tests for an adequate hole before releasing the current process memory. Reprogram this algorithm to do better.

  How do we read a numeric value using joptionpane method

How do we read a numeric value using JOptionPane method

  Write an appropriate me expression

Write an appropriate ME expression capturing the essence of each of the following topics:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd