Question
number1: Evaluate passwords use a word processing program like Word or Writer to create a file called security . -Link to How secure is my
number1: Evaluate passwords
use a word processing program like Word or Writer to create a file called security.
-Link to How secure is my password. (https://howsecureismypassword.net) Type in (an approximation of) your password. Copy a screen shot of the result into the security document.
-On the next page of your document, include a memorable password that will take at least a trillion years to crack, an explanation of why it's memorable and a screen shot of the result from How secure is my password
-On the next page of the document, at the top, type common passwords, and list 5 common passwords. (The most common passwords change annually, but some passwords constantly make the top 10 list). Include a link to the source of your information
number2: No tech hacking
-View the video No Tech Hacking (at least minutes 9 - 16). (https://www.youtube.com/watch?v=5CWrzVJYLWw) Using your car (or a car of a friend or family member), record at least 10 things that a stranger could deduce about the owner of the car from looking at the car. Add this list to a separate page in the security document created in number1
number 3: Social Engineering
-Read through the article The easier form of hacking: social engineering. (http://resources.infosecinstitute.com/the-easier-form-of-hacking-social-engineering/) On a separate page of the security document created in Part 1, pick one of the examples and explain how and why it works. Would it have worked on you? Why or why not?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started