Describe tool speed at cracking the passwords

Assignment Help Computer Network Security
Reference no: EM133310315

Lab Report Instructions

Your completed worksheet will illustrate how your team tested password cracking tools and learned much more about the strength of passwords. Explain to the director of IT and the members of the board that the health-care organization's antivirus software will detect password-cracking tools as malware. You will also explain how this impacts the effectiveness of testing security controls like password strength. Through persuasive arguments in your lab report and presentation, help the organization's leaders understand the risks and benefits of using password-cracking tools. If any of the attacks take longer than two to three minutes to guess a password, record the estimated length of time the tool anticipates taking to guess it.

Topics to Address in Your Lab Report Worksheet

1. Compare and contrast the results from the two methods used to crack the user accounts.

Describe the tool's speed at cracking the passwords and draw conclusions that are relevant to the organization's cybersecurity posture.

2. Explain how the tools respond to password complexity.

Explain how strong passwords are constructed and your team's recommendations for the organization.

Explain the four types of character sets used for strong passwords, how many you should use, the general rules for password length, and recommendations for how often passwords should be changed.

3. Discuss the benefit of penetration testing.

Explain what that would entail in the organization and what the team could learn from the testing. Discuss the pros and cons of using the same usernames and passwords on multiple systems.

4. Discuss any ethical or legal considerations for how you would use password cracking tools.

When you have completed your lab report in the worksheet, complete with screenshots to demonstrate what you did, you will work on the presentation for the board of directors.

Reference no: EM133310315

Questions Cloud

Crucial ongoing responsibilities in security management : Is one of the most crucial ongoing responsibilities in security management with strategic, tactical, and operating elements
Normalized set of relations from the model : Fred Jones dealership sells Fords, Hondas, and Toyotas. Write out a normalized set of relations from the model.
Structured english can be expressed in terms : Structured English can be expressed in terms of all of these types EXCEPT? Decision Structuring Graphs. Case Structured Text
Cybersecurity effort in corporate and government agencies : What might be some threats and some advantages to having a joint cybersecurity effort between corporate and government agencies?
Describe tool speed at cracking the passwords : Describe the tool's speed at cracking the passwords and draw conclusions that are relevant to the organization's cybersecurity posture.
Two it security policy documents : Discuss the similarities and differences between the two IT security policy documents
Covert cyber operation designed to promote democracy : Suppose the President of the U.S. wants to conduct a covert cyber operation designed to promote democracy in the fictional country of Drako.
Do the tables exhibit referential integrity : Do the tables exhibit entity integrity? Do the tables exhibit referential integrity?
Characteristics of global nature of botnets : Discuss six specific characteristics of the global nature of botnets

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss the terms confidentiality and integrity

Discuss the terms confidentiality, integrity, and availability as they relate to information systems. Why are they important

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  Plan and implement application servers for an organisation

Perform the configurations using either virtually or physically installed server OS to realise the scenario. Students can use Windows Server

  Defines five it security positions

Create a 1-page outline to be included with your audit that defines five IT security positions that will add significant expertise and experience to your security audit.

  What kinds of things do you think the administrator will see

A network administrator views the output from the "show ip route" command. What kinds of things do you think the administrator will see on the output?

  Describe an ecommerce network and its application

Describe an ecommerce network and its application. Does a properly installed and maintained firewall provide adequate defense against intrusion?

  Describe how ISO 27001 can be used for measuring

Describe how ISO 27001 can be used for measuring an organizations readiness level - Should target your organization's senior leadership

  What is 128-bit encryption

Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available to the general public, is "128-bit encryption" the strongest

  What is a cyber attack and how can cyber security help

What is a Cyber Attack? How can cyber security help? Why are contingency planning and vulnerability management important?

  What are the main differences between operating systems

What are the main differences between operating systems for mainframe computers and personal computers?

  How technology information applies to the global environment

Introducing Network Devices- Write a 2- to 3-page paper explaining how this technology information applies to the global environment.

  What threat might pose to your computer system

Suppose that while trying to access a collection of short videos. What threat might this pose to your computer system if you approve this installation request?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd