Instructions Project 2-1 Use an Online Password Cracker. You will need to submit answers IN A WORD DOCUMENT for the following: Item 10 – How long did it

Instructions

Project 2-1 Use an Online Password Cracker.

You will need to submit answers IN A WORD DOCUMENT for the following:

Item 10 – How long did it take this online rainbow table to crack this hash?

Item 19 – How long did it take this online rainbow table crack this stronger password hash?

Item 20 – How long did it take to crack your password hash (DO NOT TELL ME YOUR PASSWORD!!)?

Item 21 – What does this tell you about the speed of cracking passwords? What does it tell you about how easy it is for attackers to crack weak passwords?

Case Project 2-1 Testing Password Strength (pg 72)

DO NOT SUBMIT YOUR PASSWORDS TO ME! The Microsoft link mentioned in your textbook is not working. Use this link as your third testing service: 

Fill in the table in the attached Word document using the reporting format from the particular website that indicates the strength of your passwords (AGAIN DO NOT SUBMIT YOUR PASSWORDS).

Next write a paragraph about this experience. How secure are your passwords? Would any of these tools encourage someone to create a stronger password? Which provided the best information?

AttachmentsCase Project 2-1 Template.docx(12.06 KB)

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Read the Tyrvainen et al. (2006) article (see the Figure 1 framework) and Grahlmann et al. (2012) article (see the Figure 2

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key Assignment template. In addition, describe why the proposed solution is the correct method or mechanism to be implemented. Key Assignment template. Propose an appropriate network infrastructure that

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should demonstrate your understanding of professional and ethical responsibility in relation to cyber security operations and leadership. For this assignment, review your coursework  and identify artifacts that can

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled Data Breach an All-Too-Often Occurrence. After reviewing the story, conduct research online into

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled The Importance of Knowing Your Own Security Posture.  After reviewing the story, conduct