logo Hurry, Grab up to 30% discount on the entire course
Order Now logo

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Kevin BatesTechnical writing
(5/5)

636 Answers

Hire Me
expert
John GrettonSociology
(5/5)

938 Answers

Hire Me
expert
Anmol AroraGeneral article writing
(5/5)

858 Answers

Hire Me
expert
Jayden StewartEnglish
(4/5)

632 Answers

Hire Me
Probability
(5/5)

What are the rules for creating each password? Think of the minimum requirements for passwords in each scenario

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Password Encryption Assignment

In this digital world, it is very important to have “strong” passwords in order to protect our personal data. The difficulty is creating passwords that we can remember and yet are hard to guess from possible attackers. In this assignment, we will analyze “what needs to be considered” when creating a “strong” password.

Consider four passwords used for bank cards, websites, and so on. DO NOT write them down.

a. What are the rules for creating each password? [3A]

1.Online banking

-research if needed 2.Email 3.Social media sites 4. OES School login

Minimum length

What must be included

What must not be

included

b. Think of the minimum requirements for passwords in each scenario [5A]

for example: 4 characters, must include uppercase and numbers

How many possible passwords can be created using the minimum requirements in each scenario below? Show all calculations using proper notation.

i. Online banking:

ii. Email:

iii. Social websites:

iv. School login :

c. At 90 000 codes per second, how long, on average, would it take for a good password cracking program to break each of your passwords? [2T]

Online banking: Email:

Social websites: School login:

d. Some passwords require at least one digit and at least one capital letter. Why? Provide calculations to support your answer. [3T]

e. Develop a set of guidelines to identify a good, poor, or average password. Back it up with examples and calculations. [3T]

(5/5)
Attachments:

Related Questions

. The fundamental operations of create, read, update, and delete (CRUD) in either Python or Java

CS 340 Milestone One Guidelines and Rubric  Overview: For this assignment, you will implement the fundamental operations of create, read, update,

. Develop a program to emulate a purchase transaction at a retail store. This  program will have two classes, a LineItem class and a Transaction class

Retail Transaction Programming Project  Project Requirements:  Develop a program to emulate a purchase transaction at a retail store. This

. The following program contains five errors. Identify the errors and fix them

7COM1028   Secure Systems Programming   Referral Coursework: Secure

. Accepts the following from a user: Item Name Item Quantity Item Price Allows the user to create a file to store the sales receipt contents

Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip

. The final project will encompass developing a web service using a software stack and implementing an industry-standard interface. Regardless of whether you choose to pursue application development goals as a pure developer or as a software engineer

CS 340 Final Project Guidelines and Rubric  Overview The final project will encompass developing a web service using a software stack and impleme