In yournbspxxassign3nbspfolder created innbspassignment1


Part 1: Evaluate passwords

In your XXAssign3 folder created in Assignment1, use a word processing program like Word or Writer to create a file called security

  • Link to How secure is my password.  Type in (an approximation of) your password.  Copy a screen shot of the result into the security document.
  • On the next page of your document, include a memorable password that will take at least a trillion years to crack, an explanation of why it's memorable and a screen shot of the result from How secure is my password
  • On the next page of the document, at the top, type common passwords, and list 5 common passwords.  (The most common passwords change annually, but some passwords constantly make the top 10 list).  Include a link to the source of your information

Part 2: No tech hacking

View the video No Tech Hacking (at least minutes 9 - 16).  Using your car (or a car of a friend or family member), record at least 10 things that a stranger could deduce about the owner of the car from looking at the car.  Add this list to a separate page in the security document created in Part 1

Part 3: Social Engineering (10 points)

Read through the article The easier form of hacking: social engineering.  On a separate page of the security document created in Part 1, pick one of the examples and explain how and why it works.  Would it have worked on you?  Why or why not?

Solution Preview :

Prepared by a verified Expert
Business Management: In yournbspxxassign3nbspfolder created innbspassignment1
Reference No:- TGS01670079

Now Priced at $15 (50% Discount)

Recommended (97%)

Rated (4.9/5)