Get fast, custom help from our academic experts, any time of day.
Place your order now for a similar assignment and have exceptional work written by our team of experts.
Secure Original On Schedule
Step 3: Password Cracking Tools
You
have successfully examined the threats to a healthcare organization’s
information systems infrastructure. Now, you must begin your research
into password cracking software. Do some quick independent research on
password cracking as it applies to your organization.
COMPLETE THIS LAB
Here are some resources that will help you complete the lab:
Accessing the Virtual Lab Environment: Navigating the Workspace and the Lab Setup.
Please review the WorkSpace and Lab Machine Environment Tutorial
Lab Instructions: Password Cracking With Cain & Abel and Ophcrack
Self-Help Guide: Workspace: Getting Started and Troubleshooting
Getting Help: To obtain lab assistance, email GraduateCyber@umuc.edu using the following template in the body of your email.Your full name:
Your user ID:
Preferred email:
Your course and section number:
Detailed description of the issue that you are experiencing:
Machine type (PC, tablet, mobile device):
OS type and version:
Browser type and version:
Provide
any information related to the issue that you are experiencing and
attach any screenshot that you may be able to produce related to the
issue.
Additional Lab Support Information:
More
lab-related self-help information is available if you register for CLAB
699, our free online graduate Cyber Computing Lab Assistance hub.
Registering for Cyber Computing Lab Assistance
After
completing the lab, you will have successfully tested more than one
password cracking tool. Not all password cracking tools will necessarily
perform with the same speed, precision, and results, making it
important to test a few different products. Compare the password
cracking tools based on these characteristics, and include as part of
your assessment and recommendations on the use of such tools. You will
test the organization’s systems for password strength and complexity and
complete validation testing. You will compare the results obtained from
your first and second tool.
You have
tested and made comparisons of the performance of various password
cracking tools and you have the data to support your recommendations for
the use of such tools.
Not all
password cracking tools will necessarily perform with the same speed,
precision, and results, making it important to test a few different
products. The comparison will be part of your assessment and help you
make recommendations on the use of such tools. You will test the
organization’s systems for password strength and complexity and complete
validation testing. You will compare the results comparing the various
tools.
Read this article about Cyberattacks,
perform two different types of cyberattacks in the first, and in the
second tool, crack user account passwords. Describe them in simple
nontechnical terms for the leadership. You can identify which tool is
the most effective and why for your organization’s IT environment
Compare
and contrast the results from the two methods used to crack the
accounts for the three passwords (each encrypted by the two hash
algorithms). Show their benefits. You can make certain conclusions that
help your company’s cybersecurity posture after using these methods.
Explain
to the director of IT and the members of the board that the healthcare
organization’s anti-virus software will detect password cracking tools
as malware. Also explain how this impacts the effectiveness of testing
security controls like password strength. Help the leadership understand
the risks and benefits of using password cracking tools, through
persuasive arguments in your report and presentation. If any of the
tools take longer than 4-5 minutes to guess a password, record the
estimated length of time the tool anticipates to guess it.
Get fast, custom help from our academic experts, any time of day.
Secure Original On Schedule