Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Computer Security 5). Classify the following proposed passwords as good choices

ID: 3798579 • Letter: C

Question

Computer Security

5). Classify the following proposed passwords as good choices or poor choices, and justify your reasoning

a. Mary

b. go2work

c. cat&dog

d. 3.1515pi

6). If password aging is based on previous passwords, why should those previous passwords not be stored in the clear disk?

7). The program su enables a UNIX user to access another user's account. Unless the first user is the superuser, su requires that the password of the second user given. A (possibly aprocyphal) version of su would ask for the user's password and, if it could not determine if the password was correct because the password file could not be opended, immediately grant superuser access so that the user could fix the problem. Discuss which of the design principles this approach meets, and which one violates.

Explanation / Answer

Answer 5).

a. Mary - It is considered as a very poor password as the strength of the password is very weak and the password is just a simple name. The password should be an Alphanumeric code with some special characters included in it.

b. go2work- This is considered as kind of poor password as it is a concatenation of dictionary words. The 2 used in place of two adds something complex but not that much.

c. cat&dog- It is also not considered as the best of passwords to be chosen but the & used in place of and adds something complex in the password.

d. 3.1515pi- This password can be considered as a good password as it is basically a combination of some numbers, alphabets and dot(unique character). Also the password looks to be related and easy to learn as the value of pi i.e. 3.1416 is used to some extent to decide the password numbers.

Answer 6)

As the knowledge of previously stored passwords may give some hints to the attackers on how the password was created like the strucutre used in the previous passwords may be used to decode the current one. The attacker can go through the patterns used earlier, deduce the pattern and try to find the missing elements. Thereby guessing the correct password by using various permutation and combination of the words.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote