All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Corporate Computer and Network Security, Coursework Example

Pages: 4

Words: 1042

Coursework

What password cracking method would be used for each of the following passwords? Critique the safety of each giving your specific reasoning.

swordfish; Lt6^; Processing1; nitt4aGm^

Swordfish is a suitable password that is long in length with nine letters but it doesn’t vary with other characters and altering of upper or lower cases. A password cracking method that would be utilized is a dictionary attack that would try a list of words commonly uses in order to gain access, no matter the case. In more advanced dictionary attack programs they would even account for numbers added, however, if the word is misspelled then it could not be able gain access.

Lt6^ is a good password that uses a combination of characters including special and numbers, however it is short in length. The password cracking method that could be used is brute force method that would be able to guess the password sing I only contains four characters, if it was longer it could be a stronger password that would make it difficult to crack.

Processing1 is another password that is long in length with eleven characters with a number added to make it stronger however it has a capitalized letter and a number at the end. A password cracking method that could be used Brute-force that would guess the password, it is a last resort option and less efficient because of the length and mixture of characters.

Nitt3aGm^ is a very strong password that uses a combination of numerical and special characters making it difficult for password cracking passwords to crack. The program that could be used is Brute-force because it is a last resort, the length combined with its combination make it a formative password.

Someone says that she wishes to protect her desktop PC from a walk-up attacker with a password or passwords. Give her advice and reasons for your advice. This is not very short answer.

Protecting your computer is very important as it holds personal and important information. Protecting your PC from a walk up attack is a doable if you take the following steps. First the computer must secured that it inhibits an intruder from a walk up attack that will gain access to the computer or be able to look at the computer screen. Secondly passwords must be stronger containing a combination of numbers, special characters, upper or lower case letters, and at least eight characters to prevent a password breech. If the password is not strong it can make the desktop vulnerable to intrusion. The password should not contain words that can be in a dictionary or easily guessed such as cities, birthdays, or others that can be familiar to an intruder. These passwords can be cracked with dictionary programs or hybrids that specialized in cracking passwords. To ensure that the desktop will not be breechable from the password, do not share the password with anyone, place it instead somewhere where on you know its location or a secure cabinet. When your desktop goes to the screensaver make sure to have a password protected enabled so that when someone gets on the desktop they will be prompted to enter a password. The password needs to be changed at least every 90 days and not reused on other programs or systems so that it won’t be compromised. Other security measures include adding a biometric fingerprint scanner that would enable only you to access the computer, and you will not need to remember a password.

What do FRRs mean when fingerprint scanning is used to secure a PC against walk-up attacks? What might produce high FRRs? Can you think of a way that this problem could be reduced in fingerprint scanning?

FRRs or False Rejection Rate increase the probability that an error will occur or the scanner will fail. FRRs mean that the user would not be able to access the computer, they can be faulty and contain errors that can be compromised by a dirty scanner or a dirty finger. A blemish or a cut from the user can obscure and compromise the fingerprint needed. High FRRs can be reduced when guidelines are followed with the clean placement of the finger on the scanner from just one users, can guarantee that the read will be clean and registered.

Centralizing authentication and authorization reduces cost, improves consistency, and permits rapid provisioning and changes. List the technologies on the way toward greater centralization, beginning with stand-alone authenticators through corporate metadirectory servers.

Centralizing authentication and authorization can utilize several technologies that can be used with standalone authenticators and metadirectory servers. Stand-alone authenticators are the least centralized and require changes to be made individually to each authenticator to ensure consistency. Another technology is directory server that are central repositories for information of software, databases, equipment, and people used to update authentication servers in large networks like, Kerboros, RADIUS, and other Central Authentication Servers that are also used. Metadirectory servers use synchronizing authentication across disparate directory servers like Sun ONE, Active Directory, Microsoft Identity Servers, etc.

List at least six identities for yourself that require different authentication and authorizations.

Wireless User on the school network to gain access to student records, classes, and the internet that requires authentication with the use of ID and password that are authorized through the ITS department.

Accessing online banking that is authenticated through a combination of access number or id that is usually the bank account number and a unique password. Authentication gives user access to the account, transfers, and other uses.

Home network, that is authenticated through the initial set up from the router, an administrative password that can be changed that gives authorization and full control to the router and access point.

Access to Computer lab that is authenticated by class or teacher and ITS department with a student ID and password that gives authorization to access class materials, internet, and other lab materials needed.

Job Computer Network that is authenticated by the branch manager and ID with a password provided by the I.T department. Authorization is given in order to gain company records, client information, and other personnel files.

Work Email Account that is authenticated through the IT department with a work ID or username and password that is uniquely generated from the initial set up of the email account. Authorization includes access to email account, messages, and other documents.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Coursework Samples & Examples

Residential Sanitation Automation, Coursework Example

Contracting for Trash Table 1 presents information and analysis suggesting that the automated system with new technology will save the city money over time. Over [...]

Pages: 1

Words: 404

Coursework

Relevant Law and Process, Coursework Example

Part I Personal contact information: Elsa and Doug Gardner Alternative contact information: Representative contact information: Respondent contact information: Cornerstone Family Services. Grounds of Alleged Discrimination [...]

Pages: 2

Words: 637

Coursework

Venture Capital, Coursework Example

Alpha Ventures’ proposal has two different capitalization tables. The tables depend on whether the fiscal year 2000 revenues threshold of $500,000 will be met. Question [...]

Pages: 5

Words: 1292

Coursework

Veil Piercing in the Supreme Court, Coursework Example

Introduction Prest v. Petrodel [2013] UKSC 34 has been one of the most contentious cases in English company law for almost ten years. This case [...]

Pages: 12

Words: 3238

Coursework

Consumer Law, Coursework Example

Introduction The existing economic theory and taxonomic framework, which identifies consumers as ‘average,’ ‘vulnerable,’ ‘informed,’ or ‘confident,’ is a valuable tool for regulating consumer behavior [...]

Pages: 14

Words: 3725

Coursework

Banking Law – Critically Discuss Statement, Coursework Example

Maintaining client confidentiality is a core value in several professions, like law and banking. The notion behind secrecy is that sensitive information must be safeguarded [...]

Pages: 13

Words: 3530

Coursework

Residential Sanitation Automation, Coursework Example

Contracting for Trash Table 1 presents information and analysis suggesting that the automated system with new technology will save the city money over time. Over [...]

Pages: 1

Words: 404

Coursework

Relevant Law and Process, Coursework Example

Part I Personal contact information: Elsa and Doug Gardner Alternative contact information: Representative contact information: Respondent contact information: Cornerstone Family Services. Grounds of Alleged Discrimination [...]

Pages: 2

Words: 637

Coursework

Venture Capital, Coursework Example

Alpha Ventures’ proposal has two different capitalization tables. The tables depend on whether the fiscal year 2000 revenues threshold of $500,000 will be met. Question [...]

Pages: 5

Words: 1292

Coursework

Veil Piercing in the Supreme Court, Coursework Example

Introduction Prest v. Petrodel [2013] UKSC 34 has been one of the most contentious cases in English company law for almost ten years. This case [...]

Pages: 12

Words: 3238

Coursework

Consumer Law, Coursework Example

Introduction The existing economic theory and taxonomic framework, which identifies consumers as ‘average,’ ‘vulnerable,’ ‘informed,’ or ‘confident,’ is a valuable tool for regulating consumer behavior [...]

Pages: 14

Words: 3725

Coursework

Banking Law – Critically Discuss Statement, Coursework Example

Maintaining client confidentiality is a core value in several professions, like law and banking. The notion behind secrecy is that sensitive information must be safeguarded [...]

Pages: 13

Words: 3530

Coursework