User and system passwords

Assignment Help Basic Computer Science
Reference no: EM13839930

Application: Password Scan

User and system passwords, in theory, should be relatively easy to remember and be hard to guess (which includes avoiding common words susceptible to a "dictionary" attack). Many sites require that passwords conform to rules such as:

  • minimum length (usually at least 6 or 8 characters)
  • include both upper and lower case letters
  • include at least one digit
  • include at least one special characters ($, #, @, %, !, etc.)

Constructing such a password that is reasonably easy to remember is generally not difficult. For example, here are some passwords that are not dictionary words and that follow the rules mentioned above:

  • SprBwl#44
  • Dinner@8
  • $64Dollars
  • NY.Mets.1969

Passwords should never contain character strings associated with the user, such as birth dates/years, personal names, addresses, user IDs, or Social Security numbers. Which of the following passwords are not allowable under these rules? (Assume an 8-character minimum length.) Explain why each does not meet the required criteria.

  • BigDog
  • Christmas2010
  • JohnSmith.1963
  • Tea4Two
  • bQj3&&5k
  • 12345678
  • aaaaaaaa
  • password
  • banana
  • Baltimore
  • 214MainStreet
  • June15-1974
  • RollingStones

Now create five passwords that look very different but that use the above rules. Some sites put restrictions on passwords, such as:

  • No spaces
  • No special characters
  • Maximum length (usually 8 characters)

Additionally, some systems prevent the reuse of old passwords or impose other restrictions such as maximum password lifetime (often 30 or 90 days). As a result, you cannot have just one password that you use everywhere. Aside from the risk of using the same password at multiple sites, write a 1- to 2-page paper that proposes a strategy that a user could follow to manage frequently changing passwords across a variety of sites.In APA Format.

Reference no: EM13839930

Questions Cloud

Advertise a government program or service : Prepare a 700- to 1,050-word paper analyzing the website to determine if it provides useful information for the public (doing the public good) or if its purpose is to advertise a government program or service (doing well for government)
Effects on the accounts and financial statements : Illustrate the effects on the accounts and financial statements of each of the preceding transactions - plan was approved by the stockholders
Is chipotle a socially responsible organization : Is Chipotle a socially responsible organization? Why or why not? Some would argue that Chipotle is not socially responsible because its menu is full of very high-fat, high-calorie items, which encourages obesity. How would you respond to such criti..
Focus of the final exam : The purpose of the Final Exam is to assess your understanding of the main statistical concepts covered in this course and to evaluate your ability to critically review a quantitative research article.
User and system passwords : Application: Password Scan User and system passwords, in theory, should be relatively easy to remember and be hard to guess (which includes avoiding common words susceptible to a "dictionary" attack). Many sites require that passwords conform to rule..
What is the childs usual way of communicating feelings : What is the childs usual way of communicating feelings
Discuss the stages of the counseling process : When using interventions with children and adolescents, the developmental level of the client is an important consideration. Discuss the effect of developmental levels on both the choice of intervention and the potential effectiveness of an interv..
Discuss how peta could respond to bills two arguments : Using the relevant principles of contract law and cases, discuss how Peta could respond to Bill's two arguments AND give your conclusion on the likely outcome of this case.
Commandments of computer ethics : Commandments of Computer Ethics

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain effects of compaction on normal processing

What about if you upgrade to memory that can be read or written to in 1nsec? Comment briefly on the effects of compaction on normal processing.

  Which of the following file formats can store macros

Which of the following file formats can store macros

  Create a one page outline for computer crimes

How does technology effect ethics - what are the social, economic, political, and global attributes of your topic?

  Use double variable to represent the private data of class

Use double variable to represent the private data of the class. Provide a constructor that enables an object of this class to be initialized when it is declared.

  Critical importance of it in company strategy

For this assignment you will have to prepare a paper that critically discusses how organizations apply the strategic use of IS/IT to achieve competitive advantage. Some aspects and issues you may discuss in your paper could include (but are not li..

  Mips uses word alignment

MIPS uses word alignment, so all words are stored in memory on word boundaries; this means that address bits A[1:0] are always 00. How many and which address bits would be allocated for the set index?

  Explain significance of top management commitment

Explain the significance of top management commitment and development of standards for successful project management. Give examples to show the significance of these items based on experience on any type of project.

  What does it mean for a problem to be well posted

What does it mean for a problem to be (i) well-posed?, (ii) ill-conditioned? Explain.

  Draw a pda for the language

Draw a PDA for the language L over {0,1} consisting of strings with an equal number of 0's and 1's. So 010011 would be in this language. Next draw a DFA recognizing 0?1?. Use the algorithm from class to draw a PDA for the intersection of these two..

  Recognize all of the stakeholders comprised in the project

prepare a list of it project-based tasks in an organization where you have worked. if you have not worked in any

  Prototyping is the best approach on a design project

Your boss decides that prototyping is the best approach on a design project. Describe to her the weaknesses and hazards associated with prototyping. Explain what you can do to minimize the risk of experiencing the hazards associated with prototyping

  Prepare a data dictionary entry and process description

Prepare a list of data stores and data flows needed for your Team Process Assignment. Under each data store, list the data elements required - Prepare a data dictionary entry and process description for your Team Process Assignment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd