Question: number1: Evaluate passwords use a word processing program like Word or Writer to create a file called security . -Link to How secure is my

number1: Evaluate passwords

use a word processing program like Word or Writer to create a file called security.

-Link to How secure is my password. (https://howsecureismypassword.net) Type in (an approximation of) your password. Copy a screen shot of the result into the security document.

-On the next page of your document, include a memorable password that will take at least a trillion years to crack, an explanation of why it's memorable and a screen shot of the result from How secure is my password

-On the next page of the document, at the top, type common passwords, and list 5 common passwords. (The most common passwords change annually, but some passwords constantly make the top 10 list). Include a link to the source of your information

number2: No tech hacking

-View the video No Tech Hacking (at least minutes 9 - 16). (https://www.youtube.com/watch?v=5CWrzVJYLWw) Using your car (or a car of a friend or family member), record at least 10 things that a stranger could deduce about the owner of the car from looking at the car. Add this list to a separate page in the security document created in number1

number 3: Social Engineering

-Read through the article The easier form of hacking: social engineering. (http://resources.infosecinstitute.com/the-easier-form-of-hacking-social-engineering/) On a separate page of the security document created in Part 1, pick one of the examples and explain how and why it works. Would it have worked on you? Why or why not?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!