Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Matriematice Anovariven Use the following scenario context to help you understand question 6 on the next page. Suppose that you are a cryptographer ( someone

Matriematice
Anovariven
Use the following scenario context to help you understand question 6 on the next page.
Suppose that you are a cryptographer (someone who designs or decodes encryption data for online storage) for a company that streams movies to subscribers.
Subscribers each have an online account and your company has noticed an increase in the number of accounts being hacked into each month. As a result, they are asking you how to most efficiently improve their minimum password strength.
Hackers try accessing accounts by using programs that test password permutations at incredible speeds. To put into perspective how fast this can be done, an account with a password that is 9 characters long and only uses lowercase letters can be accessed in about 2 minutes.
This is a big reason why some websites will give you a limited number of attempts to log-in and then lock your account if you cannot log-in within those number of attempts, in case a hacker is trying to use a program to access your account!
TIME IT TAKES A HACKER TO BRUTE FORCE YOUR PASSWORD q,
\table[[\table[[Number of],[Characters]],\table[[Numbers],[Only]],\table[[Lowercase],[Letters]],\table[[Upper and],[Lowercase Letters]],\table[[Numbers, Upper],[and Lowercase],[Letters]],\table[[Numbers, Upper],[and Lowercase],[Letters, Symbols]]],[4,Instantly,Instantly,Instantly,Instantly,Instantly],[5,Instantly,Instantly,Instantly,Instantly,Instantly],[6,Instantly,Instantly,Instantly,1sec,5 secs],[7,Instantly,Instantly,25 secs,1min,6 mins],[8,Instantly,5 secs,22 mins,1 hour,8 hours],[9,Instantly,2mins,19 hours,3 days,3 weoks],[10,Instontly,58 mins,1 momih,7 months,5 years],[11,2 secs,doyil,5 yeors,41 poces,Aco wers],[12,25 secs,3 weeksto,300 fivars,Moredis,34 your],[13,4 mins,1 year,16k vars,100ky+6,2m years],[14,41mins,\table[[-1 yeors],[entowt]],took your,9m years,200m yeors],[15,6 hours,4kg yans,43m years,600m years,15 bn years],[16,2 ures,3aisyonre,2bn years,37bn years,Itn years],[17,4 wo coss,800k yats,100bn years,2tn years,93tn years],[18,9 moming,23m yours,Gin. reers,100th years,7gd yeace]]
(A)
-Data sourced from
HowSecursismyPassword.net
Infographic reproduced with permission from Hive Systems,
Source: h ttps://www.
hivesystems.io/blog/are-your-passwords-in-the-green
Once you have answered these questions, remember to submit your answers to your teacher according to the directions in your lesson. Finish the remainder of Lesson 1 on Moodle. Now go to Lesson 2 on Moodle.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Concepts of Database Management

Authors: Philip J. Pratt, Joseph J. Adamski

7th edition

978-1111825911, 1111825912, 978-1133684374, 1133684378, 978-111182591

More Books

Students also viewed these Databases questions