Cybersecurity Activity 1.1.2 Password Protection and Authentication Be sure to BOLD and underline all short answers. 2 points each Vocabulary Word 1. virtual machine 2. crack Definition An emulation of a computer system. 3. Python Script A collection of Python code or commands that perform some function. 4. brute force attack An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct. 5. dictionary attack A systematic attempt to crack a password by testing with words and phrases found in online dictionaries. 6. n encryptio A process that converts human-readable text or data into a coded form. It is usually used to protect data from being easily seen or accessed. 7. algorithm A set of steps to accomplish a task. It can be expressed in many kinds of notation, such as natural language, pseudocode, and flowcharts. They are essential to the way computers process data, because they contain the specific instructions for what a computer or program does. To guess or discover information, especially a password. 8. file extension The part of the filename that comes after the period, indicating the file type. 9. authorize To give permission, for example, in order to access information. 10. ate authentic To confirm your identity using knowledge known only to you or information interpreted by you. 11. CAPTCHA A system that can distinguish between a human and an automated program. STANDS FOR: Completely Automated Public Turing test to tell Computers and Humans Apart 12. Bubble 4 Response - How could these settings help safeguard personal information? Page | 1 Cybersecurity Activity 1.1.2 If you ever leave your computer unattended in sleep or lock mode and someone tries to sign in and access your information, requiring them to enter a password might stop them from accessing your information. Protection Measures for 1.1.2 14. 15. 16. 17. 18. 19. 20. 21. 22. Locking your computer when you are not working on it is a good protection measure. Use symbols Do not share your password. Change your password every several months. Don't type your passwords in front of others. Do not write down passwords, this reveals the secret of having one. Capitalize letters and words when making a password Use numbers when making a password. Use multiple words in your password PowerShell Commands 23. 24. 25. 26. 27. 28. Command dir cd Ctrl+C python clear What it Does Produces a directory, a list of files and subdirectories on your computer Change your directory Clears the error; interrupts the machine Executes a dot.py script Clear screen (not in this lesson but useful) Bubble 12 Response - Record other file extension types that you know along with the application that uses them. If you can’t think of any, ask a classmate. pptx - powerpoint doc - microsoft word .py - Python Bubble 17 – 34 Response ● ● During Algorithm 5 adding a symbol to a two-word password increases the time by a very large factor, read on in the activity while waiting for the script to finish… Step 27 takes awhile to run as well Algorithm and Description Password Guesses Time Page | 2 Cybersecurity Activity 1.1.2 29. Crack one-word fire 7022 0.00152329 30. Crack one-word (beginning) apple 894 0.00027648 31. Crack one-word(end) zebra 21323 0.00939574 33. Crack one-word-symbol (beginning) apple? 5363 0.00136274 34. Crack one-word-symbol (end) zebra? 127937 0.04284471 32. Crack one-word(average) i. 35. Crack one-word-symbol (average) 36. Crack many-word-symbol (beginning) apple+ 51827 0.01269355 37. Crack many-word-symbol (end) zakat+ 1236013 0.35013750 i. 38. Crack many-word-symbol (average) 39. Crack two-word ableafter 1112471 0.48043621 Page | 3 Cybersecurity Activity 1.1.2 40. Bubble 21 Screenshot 41. Bubble 22, Use the data that you collected to make a time estimate: 0.65028952 42. Compare how long it took to search one-word passwords and one word with a symbol. How many times longer did it take? Passwords that contain one word and a symbol took more time to find compared to passwords that just contain 1 word. For apple? the time taken was 0.00136274 s For apple the time taken was 0.00027648 s Apple? took 0.00108626 more seconds to guess compared to apple. 43. How long did it take to find a two-word password? 0.48043621 44. Using your how many times longer value, estimate how long it will take to find two words and a symbol. Around 8 seconds 45. Bubble 24 Response Passwords generated : 0FritterBarrels( 0CadentHuggerKookAbout@ 1TangentIdiomGumdrop, Page | 4 Cybersecurity Activity 1.1.2 46. Summarize why a passphrase such as purPl3!5!h0Psc0cth4y0u is better than purplehopscotch. Look back over your data and explain your answer in terms of the algorithms you used. purPl3!5!h0Psc0cth4y0u is a better passphrase compared to purplehopscotch because it uses lowercase and capital letters along with numbers and various symbols. 47. How do you think CAPTCHAs are an effective way to distinguish between an automated program and a human? CAPTCHAs are an effective way to distinguish between an automated program and a human because unlike humans automated programs find it increasingly difficult to click specific images and recognize different letters or numbers. Page | 5