Question

In: Computer Science

QUESTION 6 – CASE STUDY II [5+5+5+5+5 = 25 Marks] Reusable Passwords Case study adapted from:...

QUESTION 6 – CASE STUDY II [5+5+5+5+5 = 25 Marks] Reusable Passwords Case study adapted from: [Brooks hear. ICT Services Management (Custom Edition EBook), Pearson Education Australia, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com] Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each time he or she needs access to the resource. Unfortunately, the reusable password is the weakest form of authentication, and it is appropriate only for the least sensitive assets. Ease of Use and Low Cost: The popularity of password authentication is hardly surprising. For users, passwords are familiar and relatively easy to use. For corporate IT departments, passwords add no cost because operating systems and many applications have built-in password authentication. Dictionary Attacks The main problem with passwords is that most users pick very weak passwords. To break into a host by guessing and trying passwords, hackers often use password dictionaries. These are lists of passwords likely to succeed. Running through a password dictionary to see if a password is accepted for a username is called a dictionary attack. Password dictionaries typically have three types of entries: a list of common password, the words in standard dictionaries, and hybrid versions of words such as capitalizing the first letter and adding a digit at the end. If a password is in one of these dictionaries, the attacker may have to try a few thousand passwords, but this will only take seconds. No password that is in a cracker dictionary is adequately strong, no matter how long it is. Fortunately, good passwords cannot be broken by dictionary attacks. Good passwords have two characteristics. First, they are complex. It is essential to have a mix of upper and lower case letters that does not have a regular pattern such as alternating uppercase letters lowercase letters. It is also good— and some would say necessary— to include non-letter keyboard characters such as the digits (0 through 9) and other special characters (&, #./,?, etc.). If a password is complex, it can only be cracked by a brute-force attack, in which the cracker first tries all combinations of one character passwords, all combinations of two-character passwords, and so forth, until the attacker finds one that works. Complexity is not enough, however. Complex passwords must also be long. For short complex passwords, brute force attacks will still succeed. Beyond about 10 or 12 characters, however, there are too many combinations to try in a reasonable period of time. Overall, while long complex passwords can defeat determined attacks, most users select passwords that can be cracked with dictionary attacks. Reusable passwords are no longer appropriate in an era when password cracking programs can reveal most passwords in seconds or minutes. Passwords are only useful for non-sensitive assets. BN206 - System Administration and Management - Final Assessment Trimester 2, 2020 Page 8 of 10 Answer the following questions:

1. Discuss and explain the types of passwords are susceptible to dictionary attacks? [5 marks]

2. Can a password that can be broken by a dictionary attack be adequately strong if it is very long? Justify your answer. [5 marks]

3. Explain the types of passwords can be broken only by brute-force attacks. [5 marks]

4. What are the characteristics of passwords that are safe from even brute-force attacks? [5 marks]

5. Discuss why is it undesirable to use reusable passwords for anything but the least sensitive assets. [5 marks]

Solutions

Expert Solution

Anwser of 1 Question

Words which can be easily present in the Dictionary are susceptible to dictionary attacks.A dictionary attack is based on trying all the strings in a pre-arranged listing. Such attacks originally used words one would find in a dictionary thats why it is called dictionary attack however, now there are much larger lists available on the open Internet that contain hundreds of millions of passwords recovered from past data breaches.

Anwser of 2 Question

If a Password is broken by a dictionary Attack wheather it is long or short it is not a Strong Password .To make a Password Strong password must contain a mix of uppercase and lowercase letter with a number from range(0-9) and other signs like @#$%.

Anwser Of 3 Question

Brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.In this Attack passwords are crack which are related to organization and which also may contain numbers and other symbol in the password and Guessing is done to find the correct password.  .

Answer of 4 Question

Use different character sets: As a user, you should use a long password with a combination of uppercase and lowercase alphabets, numbers, and special symbols.

Answer of 5 Question

It is undesirable to use reusable passwords for anything because user made passwords are generally weak they can be cracked by the hacker using different methods like dictionary attack or bruteforce method.User make passwords which are easy to remember which does not contain that much upper case or lowercase letter and the length of the password is also small hence it can be easily cracked by hacker.


Related Solutions

QUESTION 6: Case Study II [10 Marks] Intellectual Property Rights and Computer Technology “Over the course...
QUESTION 6: Case Study II [10 Marks] Intellectual Property Rights and Computer Technology “Over the course of less than a decade, Facebook has morphed from a small, niche networking site for mostly Ivy League college students into a publicly traded company with a market worth of $148 billion in 2014 (up from $59 billion in 2013). Facebook boasts that it is free to join and always will be, so where’s the money coming from to service 1 billion worldwide subscribers?...
Question 3(25 Marks) Part A (12 Marks) Reusable Inc uses the sun to provide charging facilities...
Question 3 Part A Reusable Inc uses the sun to provide charging facilities for the rapidly growing electric vehicle market. The traditional methods of charging these vehicles takes too long so a product was designed for a fast charging system which reduces charging time by 50%. It has just completed the prototype for a new model. The information for the Charging system is shown below.             Direct material cost per unit                                                 $25,000             Direct labour time for the assembly...
QUESTION 5: Case Study I - ETHICS CASE STUDY [10 Marks] One for the Road—Anyone? “Florence...
QUESTION 5: Case Study I - ETHICS CASE STUDY [10 Marks] One for the Road—Anyone? “Florence Yozefu is a brilliant scientist who heads a robotics research laboratory at one of the top ten research universities. Florence has been developing wearable robotics gear that can take over the driving functions of a vehicle from a human operator when it is worn by the driver. In laboratory tests, the robot, nicknamed Catchmenot, has performed successfully whenever Florence and her assistants have worn...
QUESTION 5: Case Study I - ETHICS CASE STUDY [10 Marks] One for the Road—Anyone? “Florence...
QUESTION 5: Case Study I - ETHICS CASE STUDY [10 Marks] One for the Road—Anyone? “Florence Yozefu is a brilliant scientist who heads a robotics research laboratory at one of the top ten research universities. Florence has been developing wearable robotics gear that can take over the driving functions of a vehicle from a human operator when it is worn by the driver. In laboratory tests, the robot, nicknamed Catchmenot, has performed successfully whenever Florence and her assistants have worn...
SECTION B. (25 MARKS) ANSWER ALL THE QUESTION. Read the Case study below and answer ALL...
SECTION B. ANSWER ALL THE QUESTION. Read the Case study below and answer ALL questions in answer sheet. A major change in the Indian economy A major change in India has been the decrease in the primary sector and an increase in the manufacturing sector. Agriculture’s share of India’s national output has dropped from 40% in 1980 to 17% in 2010. For the first time, the primary sector is smaller than the secondary sector (manufacturing and construction). As a result,...
QUESTION 6 – Case Study [Total = 10 Marks] The Cisco Network Analysis Module (NAM) is...
QUESTION 6 – Case Study [Total = 10 Marks] The Cisco Network Analysis Module (NAM) is an integrated traffic monitoring service module that occupies a single slot in the chassis of the Cisco Catalyst® 6500 Series Switch. It gives Cisco network administrators full application layer visibility, providing this information to the network engineer using a browser from any point on the network. After it is installed, the NAM enables both real-time and historical application monitoring, including data and voice. With...
The project is adapted from the Chapter 4 Case Study dealing with North–South Airline In January...
The project is adapted from the Chapter 4 Case Study dealing with North–South Airline In January 2012, Northern Airlines merged with Southeast Airlines to create the fourth largest U.S. carrier. The new North–South Airline inherited both an aging fleet of Boeing 727-300 aircraft and Stephen Ruth. Stephen was a tough former Secretary of the Navy who stepped in as new president and chairman of the board. Stephen’s first concern in creating a financially solid company was maintenance costs. It was...
Westinghouse Electric Takes On The Risks Of A “Big Bang” Project Case study adapted from: [David...
Westinghouse Electric Takes On The Risks Of A “Big Bang” Project Case study adapted from: [David Hannon, “Westinghouse Electric Company Sees Global Standard Processes as the Foundation for Future Business Success,” SAP Insider PROFILES, January– March 2020 and www. westinghousenuclear.com, accessed August 14, 2020. A Westinghouse Electric Company provides fuel, services, technology, plant design, and equipment to utility and industrial customers in the worldwide commercial nuclear electric power industry. A private company created in 1999 after its predecessor was sold...
QUESTION 5        (25 MARKS) You are in charge of the audit of “cash and bank” at...
QUESTION 5        You are in charge of the audit of “cash and bank” at Beachbreak (Pty) Ltd for the financial year – end February 2018. During the interim audit conducted during late December 2017, you had audited the bank reconciliation at 30 November and found it to be correct. During March, as part of your normal year – end procedures, you are preparing to audit the bank reconciliation prepared by Otis Redding and presented below. Page 17 of 17 Bank...
QUESTION 3 (25 MARKS) (a) Differentiate between Translation and Transaction Exposure (6 marks) (b) Currently the...
QUESTION 3 (a) Differentiate between Translation and Transaction Exposure (b) Currently the exchange rate is USD1.5000/GBP and the three-month forward exchange rate is USD1.5200/GBP. The three-month interest rate is 8.0% per annum in the U.S. and 5.80% in the U.K. Assume you can borrow as much as USD1,500,000 or GBP1,000,000. (i) Determine whether the interest rate parity (IRP) is currently holding. (ii) If the IRP is not holding, show the procedures you carry out covered interest arbitrage. Calculate the arbitrage...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT