Types of character sets used for strong passwords

Assignment Help Management Information Sys
Reference no: EM133337876

Assignment:

Project: Organizational Profile and Access Management Case

Test Password-Cracking Tools and Write a Lab Report

You have successfully examined the threats to a healthcare organization's information systems infrastructure and learned how the organization can increase its security by an active management system. Now, you must begin your practical research into password-cracking software; authentication and hashing functions will get you started. Then, complete the lab activity Password Cracking with Cain using the lab instructions under Complete This Lab.

In this lab activity, you will test Cain in several different modes. Not all password-cracking attempts are completed with the same speed, precision, and results, so you will try a few attacks to see which is more effective. Your deliverable will be the completed Lab Worksheet, which will require you to provide screenshots of many steps along the way. You will be introduced to MARS, a new virtual lab environment, which will prepare you to conduct more complicated lab activities in future cybersecurity courses.

In this lab activity, you will navigate your way through the MARS environment to strengthen your password and set up conditions for using Cain to crack passwords. You will learn about different types of attacks and gain knowledge you will use in your report to the director of IT and members of the board.

The Lab Guide for Password Cracking will provide detailed instructions for each step. Record your answers on the lab worksheet, including screenshots of your work. The instructions will list the four topics, which will also be covered in your report for the IT director.

Lab Report Instructions

Your completed worksheet will illustrate how your team tested password cracking tools and learned much more about the strength of passwords. Explain to the director of IT and the members of the board that the health-care organization's antivirus software will detect password-cracking tools as malware. You will also explain how this impacts the effectiveness of testing security controls like password strength. Through persuasive arguments in your lab report and presentation, help the organization's leaders understand the risks and benefits of using password-cracking tools. If any of the attacks take longer than two to three minutes to guess a password, record the estimated length of time the tool anticipates taking to guess it.

Topics to Address in Your Lab Report Worksheet

1. Compare and contrast the results from the two methods used to crack the user accounts.

  • Describe the tool's speed at cracking the passwords and draw conclusions that are relevant to the organization's cybersecurity posture. Explain how the tools respond to password complexity.

2. Explain how strong passwords are constructed and your team's recommendations for the organization.

  • Explain the four types of character sets used for strong passwords, how many you should use, the general rules for password length, and recommendations for how often passwords should be changed.

3. Discuss the benefit of penetration testing.

  • Explain what that would entail in the organization and what the team could learn from the testing. Discuss the pros and cons of using the same usernames and passwords on multiple systems.

4. Discuss any ethical or legal considerations for how you would use password cracking tools.

When you have completed your lab report in the worksheet, complete with screenshots to demonstrate what you did, you will work on the presentation for the board of directors.

Reference no: EM133337876

Questions Cloud

What is process of finding a network vulnerability : What is the step by step process of finding a network vulnerability? I have to find 3 network vulnerabilities using Kali Linux and Metasploitable 2.
Identify ethical issues related to managerial decision : Identify ethical issues related to managerial decision making. Search the Internet, join discussion groups/blogs, and read articles from the Internet
Which three of the five criteria do you find to be the most : Which three of the five criteria do you find to be the most important? Do they seem like enough to evaluate a website? How would you define each criterion
Write vulnerabilities from each component of wamp : ITST 2258 Columbus State Community College Section will focus on the LAMP stack and 2 vulnerabilities from each component of WAMP Can you write 2
Types of character sets used for strong passwords : Explain the four types of character sets used for strong passwords, how many you should use, the general rules for password length.
Demonstrate command line to add the current date and time : OPS 105 Seneca College demonstrate command line to add the current date and time to the end of '/var/log/today'. Assume user alice has write permission
Determining the appropriate data type for each attribute : Determining the appropriate data type for each attribute is important for databaseperformance, storage size, and conducting accurate analysis on databases
Difference between data security and data privacy controls : Describe the difference between data security and data privacy controls. Describe the importance of having a data/information handling policy.
Discuss the best practices for performing threat assessment : What is business impact analysis (BIA) and how is it related to business continuity plan (BCP) and Discuss the best practices for performing threat assessment

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd