Corporate Computer and Network Security, Coursework Example

What password cracking method would be used for each of the following passwords? Critique the safety of each giving your specific reasoning.

swordfish; Lt6^; Processing1; nitt4aGm^

Swordfish is a suitable password that is long in length with nine letters but it doesn’t vary with other characters and altering of upper or lower cases. A password cracking method that would be utilized is a dictionary attack that would try a list of words commonly uses in order to gain access, no matter the case. In more advanced dictionary attack programs they would even account for numbers added, however, if the word is misspelled then it could not be able gain access.

Lt6^ is a good password that uses a combination of characters including special and numbers, however it is short in length. The password cracking method that could be used is brute force method that would be able to guess the password sing I only contains four characters, if it was longer it could be a stronger password that would make it difficult to crack.

Processing1 is another password that is long in length with eleven characters with a number added to make it stronger however it has a capitalized letter and a number at the end. A password cracking method that could be used Brute-force that would guess the password, it is a last resort option and less efficient because of the length and mixture of characters.

Nitt3aGm^ is a very strong password that uses a combination of numerical and special characters making it difficult for password cracking passwords to crack. The program that could be used is Brute-force because it is a last resort, the length combined with its combination make it a formative password.

Someone says that she wishes to protect her desktop PC from a walk-up attacker with a password or passwords. Give her advice and reasons for your advice. This is not very short answer.

Protecting your computer is very important as it holds personal and important information.  Protecting your PC from a walk up attack is a doable if you take the following steps. First the computer must secured that it inhibits an intruder from a walk up attack that will gain access to the computer or be able to look at the computer screen. Secondly passwords must be stronger containing a combination of numbers, special characters, upper or lower case letters, and at least eight characters to prevent a password breech. If the password is not strong it can make the desktop vulnerable to intrusion. The password should not contain words that can be in a dictionary or easily guessed such as cities, birthdays, or others that can be familiar to an intruder. These passwords can be cracked with dictionary programs or hybrids that specialized in cracking passwords. To ensure that the desktop will not be breechable from the password, do not share the password with anyone, place it instead somewhere where on you know its location or a secure cabinet. When your desktop goes to the screensaver make sure to have a password protected enabled so that when someone gets on the desktop they will be prompted to enter a password. The password needs to be changed at least every 90 days and not reused on other programs or systems so that it won’t be compromised. Other security measures include adding a biometric fingerprint scanner that would enable only you to access the computer, and you will not need to remember a password.

What do FRRs mean when fingerprint scanning is used to secure a PC against walk-up attacks? What might produce high FRRs? Can you think of a way that this problem could be reduced in fingerprint scanning?

FRRs or False Rejection Rate increase the probability that an error will occur or the scanner will fail. FRRs mean that the user would not be able to access the computer, they can be faulty and contain errors that can be compromised by a dirty scanner or a dirty finger. A blemish or a cut from the user can obscure and compromise the fingerprint needed. High FRRs can be reduced when guidelines are followed with the clean placement of the finger on the scanner from just one users, can guarantee that the read will be clean and registered.

Centralizing authentication and authorization reduces cost, improves consistency, and permits rapid provisioning and changes. List the technologies on the way toward greater centralization, beginning with stand-alone authenticators through corporate metadirectory servers.

Centralizing authentication and authorization can utilize several technologies that can be used with standalone authenticators and metadirectory servers. Stand-alone authenticators are the least centralized and require changes to be made individually to each authenticator to ensure consistency.  Another technology is directory server that are central repositories for information of software, databases, equipment, and people used to update authentication servers in large networks like, Kerboros, RADIUS, and other Central Authentication Servers that are also used. Metadirectory servers use synchronizing authentication across disparate directory servers like Sun ONE, Active Directory, Microsoft Identity Servers, etc.

List at least six identities for yourself that require different authentication and authorizations.

Wireless User on the school network to gain access to student records, classes, and the internet that requires authentication with the use of ID and password that are authorized through the ITS department.

Accessing online banking that is authenticated through a combination of access number or id that is usually the bank account number and a unique password. Authentication gives user access to the account, transfers, and other uses.

Home network, that is authenticated through the initial set up from the router, an administrative password that can be changed that gives authorization and full control to the router and access point.

Access to Computer lab that is authenticated by class or teacher and ITS department with a student ID and password that gives authorization to access class materials, internet, and other lab materials needed.

Job Computer Network that is authenticated by the branch manager and ID with a password provided by the I.T department. Authorization is given in order to gain company records, client information, and other personnel files.

Work Email Account that is authenticated through the IT department with a work ID or username and password that is uniquely generated from the initial set up of the email account. Authorization includes access to email account, messages, and other documents.