What is the effect on the security of the password, Computer Networking

Assignment Help:

Question:

(a) What is a script kiddie? Is it a significant security threat, and why?

(b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is the effect on the security of the password?

(c) Explain the rationale behind the fact that many banks and credit card companies allow their customers to access their accounts from ATM machines using only 4 digits personal identification numbers (PIN).

(d) Consider Alice and Bob communicating. Compare the following two possible messages M1 and M2 sent by Alice. K is the secret key shared between Alice and Bob and K {m} denotes m encrypted using K.

M1: I'm Alice, K{timestamp}
M2: I'm Alice, timestamp, hash{K, timestamp}

(i) What three security features are provided by M1 and M2?

(ii) Which message M1 or M2 is more secure and why?


Related Discussions:- What is the effect on the security of the password

Define the backbone networks, Q. Define the Backbone Networks? Backbon...

Q. Define the Backbone Networks? Backbone Networks - Allows several LANs to be connected - Non of station is directly connected to the backbone - Stations are part

Briefly explain three benefits of networking, Question 1 What are the as...

Question 1 What are the aspects you should consider while creating a showreel? Question 2 What are the different patterns of writing a resume? Elaborate each of them wit

Little spider, #question.what can we do with a spider when it red?.

#question.what can we do with a spider when it red?.

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Primary function - computer network, Primary Function Core network ty...

Primary Function Core network typically providing  the followings functionality 1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The

Describe some common threats to the hardware, Describe some common threats ...

Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan

Mail message format - application layer, Mail Message  Format When an...

Mail Message  Format When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained

Which type of switching is considered to be ''wire speed'', Cut-Through is ...

Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec

Distant vector protocols, RIP and IGRP are Distance Vectoring protocols tha...

RIP and IGRP are Distance Vectoring protocols that send their whole routing tables to their neighbours. In some Cisco literature, EIGRP is listed as an 'advanced distance vector

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd