What are some of the characteristics of weak passwords?
What will be an ideal response?
Characteristics of weak passwords include:
* A common word used as a password (such as "Christmas")-Attackers can use an electronic dictionary of common words to match the password.
* Not changing passwords unless forced to do so-An attacker would have unlimited access to the user's account for the foreseeable future.
* Passwords that are short (such as WXYZ)-Short passwords are easier to break than long passwords.
* Personal information in a password (such as the name of a pet)-These passwords are easy to identify.
* Using the same password for all accounts-Once the attacker has one password he can gain access to any computer or account this person uses.
* Writing the password down-This serves as an open invitation to break into the account.
You might also like to view...
Continuing with the example of the Election service, explain why the part of the WSDL is referred to as ‘abstract’. What would need to be added to the service description to make it completely concrete?
What will be an ideal response?
Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?
A. wireless B. access C. link D. ad hoc
The ________ identifies patterns and colors assigned to categories in the chart
A) data series B) legend C) data point D) chart sheet
Form templates are applied to form libraries and are used to collect data stored in the library
Indicate whether the statement is true or false