Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q1: What are the recommended criteria by security experts of choosing passwords

ID: 3824223 • Letter: Q

Question

Q1:

What are the recommended criteria by security experts of choosing passwords for your accounts (only four)? And why we should apply such criteria?

Q2:

In your own words, define each of the following terms. Give one example for each.

A) Denial-of-service attack.

B) Distributed denial-of-service attack.

C) Phishing

D) SQL injectio

Q3: Why we use computer simulation? List three uses?

Q4: Explain about the “Bam Theory”.

Please solve all the questions at one time because I only have 20 post per month and please answer all the questions by computer because it is hard to understand the hand writing sometimes

Explanation / Answer

recommended criteria by security experts of choosing passwords :

->Use a different password for each of your important accounts, like your email and online banking accounts. Re-using passwords is risky. If someone figures out your password for one account, it's possible they could get access to your personal information, or other online services like shopping or banking.

->Using numbers, symbols and mix of upper and lower case letters in your password makes it harder for someone to guess your password. For example, an eight-character password with numbers, symbols and mixed-case letters is harder to guess because it has 30,000 times as many possible combinations than an eight-character password with only lower case letters.

->Create a unique password that's unrelated to your personal information and uses a combination of letters, numbers, and symbols. For example, you can select a random word or phrase and insert letters and numbers into the beginning, middle, and end to make it extra difficult to guess (such as "sPo0kyh@ll0w3En"). Don’t use simple words or phrases like "password" or "letmein," keyboard patterns such as "qwerty" or "qazwsx," or sequential patterns such as "abcd1234" which make your password easier to guess.

->Update your recovery email address regularly so that you can receive emails in case you need to reset your password. You can also add a recovery phone number to receive password reset codes via text message.

Many websites will also give you the option of answering a security question if you forget your password. If you create your own question, try to come up with one that has an answer only you would know. The answer shouldn't be something that someone can guess by scanning information you've posted on blogs or social networking sites.

If you are asked to choose a question from a list, like the city where you were born, try to find a way to make your answer unique by using some of the tips above. That way even if someone guesses the answer, they won't know how to enter it correctly.

why we should apply such criteria:

The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security.

Although many alternatives for user authentication are available today, most users log on to their computer and on to remote computers using a combination of their user name and a password typed at their keyboard. Some retailers will configure their Point of Service terminals to auto login on boot. Some retailers will allow the user to select their own password. To make it easier to remember their passwords, users often use the same or similar passwords on each system; and given a choice, most users will select a very simple and easy-to-remember password such as their birthday, their mother's maiden name, or the name of a relative. Short and simple passwords are relatively easy for attackers to determine. Some common methods that attackers use for discovering a victim's password include: