Question: This chapter discusses different methods employed to illegally acquire data or system access. One method discussed in accessing data is using a brute force attack.

This chapter discusses different methods employed to illegally acquire data or system access. One method discussed in accessing data is using a brute force attack. The enclosed word document is encrypted and has a password which is between 0 and 50.
Use a brute force attack to break into the document. That is, try different values between 1 and 50(inclusive) until you are successful breaking into the document.
How many tries did you take to break into the word document?
How could I made it more difficult for you to break into the document (name at least 2 methods)?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!