Ethics and Security Assignment
Ethics and Security Assignment
Strong passwords help keep your information secure and prevent others from signing in
as you.
1. List two different ways that someone other than you could sign in to one of your online
accounts?
● Spyware
● Phishing Attack
Use a search engine and find a “strong password checker”. Check out different types of
passwords. Note: it is not a good idea to put any of your actual passwords into
these checkers.
3. Without listing any passwords that you actually use, answer these questions:
a. In what category would you place most of your passwords?
Strong passwords
Conduct Internet research on “How to devise passwords that drive hackers away” and
“How to create a strong password” or “How NOT to create a password” – read several
articles.
4. List 5 common password pitfalls to avoid when creating or storing your passwords
● Using The Same Password For More Than one website
● Using Passwords That Only Vary By One Character
● Using Any Personal Information In Passwords
● Changing Out Letters For Numbers
● Using A Short Password
To help keep your password secure, websites mix up the password using an
algorithm called a cryptographic hash function. To learn more about why it’s
important for websites to use this algorithm, first conduct internet research on
“How NOT to store passwords”.
5. Summarize three (2) poor methods for storing passwords.
Writing it on a sticky note If some else found the note or if you keep it on
your device, someone could see it and do
whatever they want with it.
6. The best method is described as Hashing Plus Salt. How does this method
work?
A new salt is randomly generated for each password. The salt and
the password are concatenated and then processed with a
cryptographic hash function. The resulting output (but not the
original password) is stored with the salt in a database.
7. To try this method, find an online sha-1 hash calculator.
Enter a word or phrase and find its hash. Then, add “salt” by putting one or
two random characters at the end of the original word to see how the hash
changes. Record the results below.