Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Presentation

Presentation Introduction to Cyber Security

Rating
-
Sold
-
Pages
5
Uploaded on
03-01-2022
Written in
2021/2022

Beginners guide to passwords and how passwords are hacked in the IT industry.

Institution
Course

Content preview

CYBER SECURITY
INTRODUCTION TO PASSWORDS – STUDY MATERIAL, DECEMBER 2021



Passwords
A password is a string of characters used to identify a user.
It can be sometimes a word, number, name, animal name and
so-on. We use passwords as a means of security to
authenticate a user and avoid giving access to an unauthorized
user. Password as a factor authentication method can be used
in smart devices like phones, laptops, iPad and so-on, we also
find passwords used in web applications as a means of logging
into our online accounts like Facebook and Gmail.
Passwords are either strong or weak. Weak passwords are
short (i.e. 5-8 characters in length) and simple to guess. Name
of a person, animal, a phone number, and even a pet’s name
are examples of weak and guessable passwords. A strong
password however is the opposite. Strong passwords are long
in length (i.e. 10 – 16 characters), they have all character
combination like numbers, letters, and symbols and are quite
difficult to guess.


Password Hacking
Password hacking is a term used to describe the process of
a hacker trying to obtain unauthorized access to a system

1

, belonging to an authorized user. Since passwords have been
introduced to IT, cyber criminals have always found ways to get
a hold of the passwords of other people in order to gain access
into the devices and accounts of the victims. The following are
ways in which passwords can be hacked,
 Password Attack: Use of computer software or tools
 Shoulder Surfing
 Social Engineering
 Inference


Password Attacks:
Password attacks involves the use of automated tools and
computer software’s to crack passwords. Two of the most
common ways automated tools work for password attacks is.
- Wordlists,
- Dictionary attacks and,
- Brute forcing


Wordlists: - Similar to dictionary attacks, wordlist involves use
of documents mostly “.txt” files which contain a numerous list of
randomly generated words or frequently used passwords. To
crack passwords.
Dictionary Attacks: - In a dictionary attack, every word in the
dictionary is used by automated tools to crack the password i.e.

2

Written for

Institution
Course

Document information

Uploaded on
January 3, 2022
File latest updated on
January 3, 2022
Number of pages
5
Written in
2021/2022
Type
PRESENTATION
Person
Unknown

Subjects

$5.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
abdurraheemabdulfattah

Get to know the seller

Seller avatar
abdurraheemabdulfattah AirForce Institute of Technology
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
4 year
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions