Uploaded by Facts and more

Activity Guide 1 1 2 Student

advertisement
Cybersecurity
Activity
1.1.2
Password Protection and Authentication
Be sure to BOLD and underline all short answers.
2 points each
Vocabulary
Word
1. virtual
machine
2. crack
Definition
An emulation of a computer system.
3.
Python
Script
A collection of Python code or commands that perform some function.
4.
brute
force attack
An attempt to discover information, especially passwords, through trial
and error. Attackers try as many passwords or phrases as possible
hoping one of the guesses is correct.
5.
dictionary
attack
A systematic attempt to crack a password by testing with words and
phrases found in online dictionaries.
6.
n
encryptio
A process that converts human-readable text or data into a coded form.
It is usually used to protect data from being easily seen or accessed.
7.
algorithm
A set of steps to accomplish a task. It can be expressed in many kinds of
notation, such as natural language, pseudocode, and flowcharts. They
are essential to the way computers process data, because they contain
the specific instructions for what a computer or program does.
To guess or discover information, especially a password.
8.
file
extension
The part of the filename that comes after the period, indicating the file
type.
9.
authorize
To give permission, for example, in order to access information.
10.
ate
authentic
To confirm your identity using knowledge known only to you or
information interpreted by you.
11.
CAPTCHA
A system that can distinguish between a human and an automated
program.
STANDS FOR: Completely Automated Public Turing test to tell
Computers and Humans Apart
12.
Bubble 4 Response - How could these settings help safeguard personal information?
Page | 1
Cybersecurity
Activity
1.1.2
If you ever leave your computer unattended in sleep or lock mode and someone tries to sign in and
access your information, requiring them to enter a password might stop them from accessing your
information.
Protection Measures for 1.1.2
14.
15.
16.
17.
18.
19.
20.
21.
22.
Locking your computer when you are not working on it is a good protection
measure.
Use symbols
Do not share your password.
Change your password every several months.
Don't type your passwords in front of others.
Do not write down passwords, this reveals the secret of having one.
Capitalize letters and words when making a password
Use numbers when making a password.
Use multiple words in your password
PowerShell Commands
23.
24.
25.
26.
27.
28.
Command
dir
cd
Ctrl+C
python
clear
What it Does
Produces a directory, a list of files and subdirectories on your
computer
Change your directory
Clears the error; interrupts the machine
Executes a dot.py script
Clear screen (not in this lesson but useful)
Bubble 12 Response - Record other file extension types that you know along with the
application that uses them. If you can’t think of any, ask a classmate.
pptx - powerpoint
doc - microsoft word
.py - Python
Bubble 17 – 34 Response
●
●
During Algorithm 5 adding a symbol to a two-word password increases the time by a very large
factor, read on in the activity while waiting for the script to finish…
Step 27 takes awhile to run as well
Algorithm and Description
Password
Guesses
Time
Page | 2
Cybersecurity
Activity
1.1.2
29. Crack one-word
fire
7022
0.00152329
30. Crack one-word
(beginning)
apple
894
0.00027648
31. Crack one-word(end)
zebra
21323
0.00939574
33. Crack
one-word-symbol
(beginning)
apple?
5363
0.00136274
34. Crack
one-word-symbol
(end)
zebra?
127937
0.04284471
32. Crack
one-word(average)
i.
35. Crack
one-word-symbol
(average)
36. Crack
many-word-symbol
(beginning)
apple+
51827
0.01269355
37. Crack
many-word-symbol
(end)
zakat+
1236013
0.35013750
i.
38. Crack
many-word-symbol
(average)
39. Crack two-word
ableafter
1112471
0.48043621
Page | 3
Cybersecurity
Activity
1.1.2
40. Bubble 21 Screenshot
41. Bubble 22, Use the data that you collected to make a time estimate:
0.65028952
42. Compare how long it took to search one-word passwords and one word with a symbol.
How many times longer did it take?
Passwords that contain one word and a symbol took more time to find compared to
passwords that just contain 1 word.
For apple? the time taken was 0.00136274 s
For apple the time taken was 0.00027648 s
Apple? took 0.00108626 more seconds to guess compared to apple.
43. How long did it take to find a two-word password?
0.48043621
44. Using your how many times longer value, estimate how long it will take to find two words and a
symbol.
Around 8 seconds
45. Bubble 24 Response
Passwords generated : 0FritterBarrels(
0CadentHuggerKookAbout@
1TangentIdiomGumdrop,
Page | 4
Cybersecurity
Activity
1.1.2
46. Summarize why a passphrase such as purPl3!5!h0Psc0cth4y0u is better
than purplehopscotch. Look back over your data and explain your answer in terms of the
algorithms you used.
purPl3!5!h0Psc0cth4y0u is a better passphrase compared to
purplehopscotch because it uses lowercase and capital letters along with
numbers and various symbols.
47. How do you think CAPTCHAs are an effective way to distinguish between an automated program
and a human?
CAPTCHAs are an effective way to distinguish between an automated program and a
human because unlike humans automated programs find it increasingly difficult to click
specific images and recognize different letters or numbers.
Page | 5
Download