Why does a change of case help make a stronger password

Assignment Help Computer Engineering
Reference no: EM131299186

Password testing

Let's evaluate the strength of one of your current passwords. Just because an attacker steals your password database does not mean he automatically knows your password. He still has to crack it. Creating a strong password can make it impractical for an attacker to crack your password.

Several password strength tools exist online. These tools can help you understand the differences between strong and weak passwords.
Directions

1. Go to https://www.passwordmeter.com/
2. Enter one of the passwords you use on a regular basis with a minor change.
3. Click Submit.
4. Take a screenshot.
5. Take note of the problems with your password (e.g., a number sequence and a dictionary word).
6. Try entering a password you might actually use that you think is strong.
7. Take a screenshot of the results.

Note: Weak passwords are typically easier to remember. However, it is possible to create a strong password that is fairly easy to remember.

8. Go to https://rumkin.com/tools/password/passchk.php

9. Click Submit several times and watch the passwords at the top of the page change. These are samples of good passwords that might be easy to remember.

10. Take a screenshot.

Submit your Screenshots and answer the following questions:

• Why do special characters (e.g., @#$%^&*) make passwords difficult to crack?
• Why does a change of case help make a stronger password?
• How did you choose the password you currently have?
• Could others follow the same logic and choose a similar password?
• Do you use the same password for multiple accounts? Why would this be a security risk?

Your well-written paper should meet the following requirements:

• Be three pages in length
• Contain an illustrative table or a diagram created from properly cited external references
• Include two credible external references in addition to the textbook
• Your paper must follow APA style guidelines, as appropriate .
• Two citations for every paragraph.
• Not plagiarized ( we check that with turnitin.com).

Reference no: EM131299186

Questions Cloud

Write a program that randomly fills an array of size fifty : Write a program that randomly fills an array of size 50 with integer values from 1 to 20 inclusively. You will need to create a global constant for the size of the array; this will be used for declaring and accessing the contents of the array.
Determine at what frequencies output sidebands are located : Determine at what frequencies the output sidebands of Figure are located. Are these sidebands or harmonics?
Make a dog class that extends pet and give the dog : Make a Dog class that extends Pet and give the dog to a second person in main. Have the dog and cat interact as described below. You will probably need to add some new methods.
Write a newspaper article that summarizes the design : Write a newspaper article that summarizes the design and the findings of the study. (Be sure to include statistical aspects, such as observational study versus experiment and any randomization used. News accounts often neglect these facts.)
Why does a change of case help make a stronger password : Why does a change of case help make a stronger password? How did you choose the password you currently have? Could others follow the same logic and choose a similar password?
Volume of a nation exports and imports : Please be sure both are half a page at minimum. Thank you. Q1: What determines the volume of a nation's exports and imports? Explain in detail.
Compute tom tax shield from the mortgage interest : RES3200 Residential Underwriting & Valuation Assignment. Tom paid $10k in mortgage interest and $4k in property taxes last year. His average tax rate is 20%, his marginal tax rate is 35%. Compute Tom's tax shield from the mortgage interest and prop..
A linear function of the input frequency difference : For the PFD of Figure, determine whether or not the average value of QA - QB is a linear function of the input frequency difference.
Justify the threat cyber terrorism poses to society : Justify the threat cyber terrorism poses to society. Provide examples to support your justification. Defend or oppose the legal processes of civil law used to resolve cases against computer crimes offenders.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make a frame-based application

build a Frame-based application that displays an array of nine buttons on a Panel. Assign the Panel to the Center of your frame. Each button should display the name of a course in your department.

  How many 0-address instructions can still you can fit

Write a MARIE program using a loop that multiplies two non-negative numbers by using repeated addition. For example, to multiply 3 x 6, the program would add 3 six times or add 6 three times.

  What are three common problems occurring on the windows

research common problems that occur with windows and create a well organized powerpoint presentation. for your

  Compare and contrast monitoring of patient vital signs by

mobile computing has dramatically changed how information is accessed and shared. wireless networking has been an

  How do css, javascript, or framesets come into play

Visit two sites that you feel meet qualifications of being "usable", and two that you find confusing, How do Javascript, CSS, or Framesets come into play on the sites.

  Summarize article in your own words and include information

Summarize the article in your own words and include information in your paper on how the article relates to course concepts. Discuss the course material.

  Design a script that checks the day of the week

Using a separate output line for each of these files, print the file path and the number of lines in the file using wc -l. make at least two TTDL files to test my program: one in my working directory and one in a subdirectory.

  Division algorithm

Divide 16 digit value N by the six digit integer D obtaining the quotient Q and remainder (or sign of remainder) R by the following division algorithms. Describe your steps and method in order to obtain the remainder.

  Create preventative controls for sungrafix

Create Preventative Controls for SunGrafix, video game design company. In some cases, outage impacts identified in BIA may be mitigated or eliminated through preventive measures that deter and/or reduce impacts to  system.

  You are a consultant for being brought in by xumuc to

you are a consultant for being brought in by xumuc to assist with a merger with another company.backgroundxumuc is has

  Design the logic for a program that merges the files

Design the logic for a program that merges the files for summer and winter programs to create a list of the first and last names of all participants for the year.

  Use information from the modular background readings as

use information from the modular background readings as well as any good quality resource you can find. please cite

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd