Chat with us, powered by LiveChat WHY DOES THE USE OF PASSWORDS PUT THE OVERALL SECURITY OF THE NETWORK IN JEOPARDY? | Writedemy

WHY DOES THE USE OF PASSWORDS PUT THE OVERALL SECURITY OF THE NETWORK IN JEOPARDY?

WHY DOES THE USE OF PASSWORDS PUT THE OVERALL SECURITY OF THE NETWORK IN JEOPARDY?

Why does the use of passwords put the overall security of the network in jeopardy? in responding to your peers’ posts, discuss whether additional measures could have been taken in order to reduce the threat potential. BELOW ARE FIVE PEER POST TO REPOND TO.

1.B) Passwords put the overall security of a network in jeopardy because they can be accessed by someone that is unauthorized. A password can be guessed, stolen, or even shared. (Shinder, 2003)

There are a ways that hackers can gain access to passwords. Below are a few.

Brute force – If at first you don’t succeed try, try, again. This type of attack just goes through every possible combination. When the Powerball gets up to that crazy jackpot do you ever think of playing every combination? (O’Donnell, 2017)
Dictionary threat – In a dictionary attack the attacker tries to breach the security by just going through every word in their dictionary to see if it gets a hit on the decryption key and gains access to the data. (Techopedia, 2017)
Rainbow tables – a bunch of pre-computed tables that contain possible passwords with hash values. These tables allow reversing of the hashing functions and gain access. Rainbow tables tend to be faster than the other 2 methods I mentioned but they take up a lot more space. (O’Donnell, 2017)

My current LAN password at work showed an online attack scenario of 1.83 billion centuries, offline of 18.8 centuries and 1.83 years for massive cracking array. A normal lazy password (asdfghjkl) came up with an online of 1.80 centuries, offline of 56.47 seconds and massive cracking of .0565 seconds. A password of 123456 is a fraction of the lazy password mentioned above. Anytime I added some kind of combination of numbers or symbols to go with uppercase or lowercase letters those timings got larger. My LAN password at work has a symbol and then is a mix of numbers and letters. It could probably be even more complex but I have been there for 20 years and we have to change it every 90 days. I have run out of things to use as a password.

2.H) One of the most popular ways to compromise a password is to simply ask for it. Yes. Social Engineering, in terms of technology is the manipulation of people into doing something that divulges personal or confidential information. Example, you get a call at work from someone claiming to be from the IT Department or working with the IT Department and needs to ask you some questions to help assist with a network issue they are having. They sound convincing, they can even spoof the phone number so it looks like it is coming from your company. Malware is another technique used to get your password. A user downloads malicious code that puts a key logger on your computer and the attacker has all your login credentials. Open wireless networks can be a heaven for criminals trying to steal your information. Packet sniffing on an unsecure wireless network is another tactic that can be used to compromise your password. Because password polices are not implemented and enforced, attackers can simply try to guess the password. People are still creatures of habit and sometimes they stick with things that just makes their life easier, not necessarily safer. 12345, QWERTY, password, and 123456789 are some of the most popular passwords that are used. (Smith, 2011)

The site www.grc.vom/haystack was an eye opener and would be something that people who do not take passwords seriously should spend some time with. In regards to passwords, size does matter. Using the password 123456789 it calculated an online attack scenario of 1 week or a massive attack of .0000111 seconds. Using a simple phrase like ‘1lovetheColts!’ which has 14 characters bumps up those attack times to an online attack of 1.57 thousand trillion centuries. It proves that passwords need to be taken more seriously. Having a passcode (think of it as a passphrase) that is 13+ charters with complexity and you are making it a lot harder for someone to compromise your password.

MU) There are a couple ways to guess and crack passwords of users. Two of the most common ways are dictionary attacks and brute-force attacks. A dictionary attack uses a file containing words, phrases, common passwords, and other strings that are likely to be used as a password (Hornby, 2016). A hacker will try all possible combinations to compromise the passwords using this technique. Another method is to use a brute-force attack. A brute-force attack tries every possible combination of characters up to a given length (Hornby, 2016). This attack is not efficient and is the most “computationally expensive”. These are the two most common methods hackers use.
Haystack:

On the website I tried and played with different passwords all using different requirements. I found that actually using a short memorable password but adding a unique padding policy actually work. With my strongest password, the time it’ll take for an online attack scenario (1,000 guesses per second) would be 1.83 billion centuries. For a massive cracking array scneario (one hundred trillion guesses per second) would take 1.83 years. Without exposing the password, it contained one uppercase, one lowercase, 1 digit, and 8 symbols. I found that using something that is simple length in addition to unique personal padding often provides the best password protection.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order