0% found this document useful (0 votes)
35 views

Ethics and Security Assignment

Uploaded by

mtbryant3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Ethics and Security Assignment

Uploaded by

mtbryant3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Ethics and Security Activity Name___________________________

Strong passwords help keep your information secure and prevent others from signing in
as you.

Answer the questions below.


For full credit, please highlight, bold or enter your answers in a different color dark font
(5% of total grade). When finished, save this document to your OneDrive/Documents
folder and submit in Canvas.

1. List two different ways that someone other than you could sign in to one of your online
accounts?
● Spyware
● Phishing Attack

Use a search engine and find a “strong password checker”. Check out different types of
passwords. Note: it is not a good idea to put any of your actual passwords into
these checkers.

2. List two very different examples of passwords that rate as:

Weak Hello 0 seconds

Medium 0us3s2024 43 hours

Strong 0us3s20241 14 hours

Very Strong 0us3s202412323 45 years

3. Without listing any passwords that you actually use, answer these questions:
a. In what category would you place most of your passwords?
Strong passwords

b. Why do you think your password(s) fit into this category?


I try to make my passwords as unique as possible to the point that only I
could remember them.

Conduct Internet research on “How to devise passwords that drive hackers away” and
“How to create a strong password” or “How NOT to create a password” – read several
articles.

4. List 5 common password pitfalls to avoid when creating or storing your passwords
● Using The Same Password For More Than one website
● Using Passwords That Only Vary By One Character
● Using Any Personal Information In Passwords
● Changing Out Letters For Numbers
● Using A Short Password

To help keep your password secure, websites mix up the password using an
algorithm called a cryptographic hash function. To learn more about why it’s
important for websites to use this algorithm, first conduct internet research on
“How NOT to store passwords”.
5. Summarize three (2) poor methods for storing passwords.

Description of the method Why this method is a bad idea

Sending your password in If your device gets hacked, someone


an email or text unintended gets that email or text, someone
else might be able to get access to what the
password was for.

Writing it on a sticky note If some else found the note or if you keep it on
your device, someone could see it and do
whatever they want with it.
6. The best method is described as Hashing Plus Salt. How does this method
work?
A new salt is randomly generated for each password. The salt and
the password are concatenated and then processed with a
cryptographic hash function. The resulting output (but not the
original password) is stored with the salt in a database.
7. To try this method, find an online sha-1 hash calculator.
Enter a word or phrase and find its hash. Then, add “salt” by putting one or
two random characters at the end of the original word to see how the hash
changes. Record the results below.

Word or phrase helloworld

First hash 6ADFB183A4A2C94A2F92DAB5ADE762A47889A5A1

Word or phrase with helloworld


“salt”

Final hash F119FC4FF2506903AEEC1AC545DEAE8EFA0E97D1

Is the final hash different? How different?

Outputs different values for the same original password.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy