Concept explainers
Explanation of Solution
Given:
A password for a system is PINE963$&apple, which is not a strong password.
To find:Â The reason why PINE963$&apple cannot be treated as a strong password.
Solution:
PINE963$&apple is not a strong password because this password contains words that can be easily guessed by an attacker.
A strong password contains at least 16 characters.
The password should not contain words that can be found in a dictionary. The password: PINE963$&apple, has two dictionary words PINE and apple.
A strong password contains a combination of uppercases and lowercases letters, numbers, and symbols.
A strong password does not use adjacent keys present on the keyboard.
Want to see more full solutions like this?
Chapter 18 Solutions
Bundle: A+ Guide To It Technical Support (hardware And Software), 9th + Voucher: Prometric A+ Exam Certificate + Pc Repair Toolkit/esd Strap Combo
- Provide justifications for the appropriateness or inappropriateness of the following suggested passwords: TV9 stove • George Washington • Aristotle • F.arrow_forwardDescribe how a fake login management problem might be fixed in this essay. Make a list of all the different authentication techniques you can think of. Do you think passwords will become obsolete in the near future?arrow_forwardWhat are two password management applications, one of which is a stand-alone application and another of which is a browser-based application? Compare their features.arrow_forward
- Describe a bogus login management situation. Authentication techniques vary. Passwords waning?arrow_forwardwhat is the difference between authentication and authorization? Can a system permit autorization without authentication? why or why not? 1 page 12pt double spaced pleasearrow_forwardDiscuss the benefits and drawbacks of Windows BitLocker encryption for data security.arrow_forward
- Explain the suitability or unsuitability of the following passwords: • a. YK 334 • b. mfmitm (for “my favorite movie is tender mercies) • c. Natalie1 • d. Washington • e. Aristotle • f. tv9stove • g. 12345678 • h. dribgibarrow_forward1.Which of the following is a type of malware that is designed to spread from one computer to another without any user interaction? Trojan Rootkit Worm Spyware 2.Which of the following cryptographic algorithms is classified as symmetric? Diffie-Hellman RSA AES ECC 3.What control provides the best protection against both SQL injection and cross-site scripting attacks? Hypervisors Network Layer Firewalls CSRF Input Validation 4.Tom would like to send an encrypted message to Jerry using asymmetric cryptography. What key should Tom use to encrypt the message? Jerry's public key Jerry's private key Tom's public key Tom's private keyarrow_forwardExplain the suitability or unsuitability of the following passwords: a. qwerty b. Einstein c. wysiwyg (for “what you see is d. drowssapwhat you get”) e. KVK 919 f. Florida g. *laptop_admin# h. cr@zyp@ssarrow_forward
- This is hypothetical authentication management. List your authentication methods. How do you feel about password security in the future?arrow_forwardInvent a situation requiring the handling of logins and describe it. Make a list of all the many ways you've established your identity. What are your ideas on how passwords will evolve in the future?arrow_forwardCan you please elaborate on why each of the following passwords is/is not a good one to use? • a TV9 stove • d. Washington • e. Aristotle • f.arrow_forward
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,