Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Labarotary Exercise | Discussion Questions

    • Home
    • Modules
    • Social Problems
    • Passwords
    • Labarotary Exercise | Discussion Questions

    LAB EXERCISE & DISCUSSION QUESTIONS

    Complete the following lab graded exercise as directed by your instructor:

     

    1. Using the checklist above, complete a checklist for each (password, password hint) pair below. Also, discuss any weakness found in the password if any.
    Password Password Hint
    a. Ihtk:JaJ I have two kids: Jack and Jill
    b. 2BontBtitq! To be or not to be, that is the question

    2. Create three passwords that are different from those previously discussed   using the pneumonic method discussed above. For each password, also provide the corresponding sentence or phrase from which it was derived.

    3. Evaluate each of the following passwords manually using the security checklist introduced in Table 1 to determine which password rules are met:

    a.  Password1!

    b. OmN;Gmj1mn

     

    1. Complete the following tasks:                                                                                 a. the following four user accounts, hclinton, dtrump, bsanders and bcarson                                                                                                                        b. Generate passwords for each of the account. The passwords should vary in length. Specifically, the lengths should be 12, 14, 16 and 20 respectively, and consist of numbers, upper-case and lower-case letters, and special characters.

     

    1. Password Checker: Use Password Checker to verify whether your passwords are strong enough. Password Checker is a Microsoft tool and is available at: https://www.microsoft.com/en-us/security/default.aspx

     

    1. Password Managers: Remembering passwords could be sometimes challenging, especially as the number of different passwords increase. Password managers provide a means of managing multiple passwords. There are several password managers that are currently available. PasswordSafe, authored by famed security specialist Bruce Schneier, is freely available at https://pwsafe.org/. Here is a Quickstart guide on how to use it.

     

    1. Cracking Passwords. View the video, Password Cracking – Computerphile: https://www.youtube.com/watch?v=7U-RbOKanYs

     

    Discussion Question

    1. If a longer password is more secure, why not just use the entire sentence instead of picking the first letter of each word?
    2. How can strong passwords contribute to national security efforts?

     

     

    REFERENCES

     

    Eitzen, D. Stanley, Maxine Bacca Zinn and Kelly Eitzen Smith. Social Problems. Boston: Pearson, 2014.

    Kendall, Diana. Sociology in Our Times: The Essentials, 10th Edition. Boston: Cengage Learning, 2016.

    NISTIR 7991 (2014). United States Federal Employees’ Password Management Behaviors – a Department of Commerce Case Study.

    Schneier, B. (2009). Schneier on Security. March9. 2009. https://www.schneier.com/blog/archives/2009/03/choosing_a_bad.html

    The Comprehensive National Security Initiative. Retrieved from:             https://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative

    Zetter, Kim. Weak Passwords Brings ‘Happiness’ to Twitter Hacker.Security, 2009

    http://blog.wired.com/27bstroke6/2009/01/professed-twitt.html

    Zhang-Kennedy, Leah. “Revisiting Password Rules:Facilitating Human Management of Passwords,” 2016   APWG Symposium on Electronic Crime Research, June 2016, pg. 1-10

    Yan, J., Blackwell, A., Anderson, R., Grant, A., The Memorability and Security of Passwords–Some Empirical Results, University of Cambridge, 2000

     

    Websites:

    http://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7991.pdf

    http://www.cdse.edu/documents/toolkits-issm/ODAA_Baseline_Security_Config.pdf

     

     

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved