You are enrolled in a cyber security course at
Exp19_Word_Ch04_HOEAssessment_Security
Exp19 Word Ch04 HOEAssessment Security
Word Chapter 4 Hands-On Exercise Assessment – Security
Project Description:
You are enrolled in a cyber security course at your local university. One of the assignments is to write a group paper with another student about password security. You and your partner conducted research on the topic and wrote a final draft of the report. Your partner has provided some feedback and suggestions, and you will review the feedback and make corrections to the paper where needed. You will also need to document the sources of the information used for the paper. You will use track changes, accepting and rejecting them as necessary, credit sources used in the preparation of the report, address your partner’s comments, include a table of contents and an index.
Start Word. Download and open the file named Exp19_Word_Ch04_HOEAssessment_Security.docx. Grader has automatically added your last name to the beginning of the filename.
Apply the following formatting to the whole document:
• Document is double-spaced.
• The font is Times New Roman.
• There is no paragraph spacing before or after any paragraph.
• Margins are 1” at the top, bottom, left, and right.
• Alignment is left.
Ensure that All Markup view is displayed. On the first page, reject the replacement of the three words used, i.e., recognize, choices, and employed. Accept all other changes in the document and stop tracking.
Modify the Title style to reflect the first comment left by your partner. Reply to the first comment by typing Adjusted Title style. (include the period.) and mark the comment as Resolved.
Find the second comment which is in the Poor Password Practices section, and italicize the passwords as instructed in the comment, but not the commas. Mark the comment as Resolved.
Create a new paragraph before the word Password as indicated by the third comment on page 3. Delete the comment.
Change the Bibliography Style to APA Sixth Edition. Click before the period in the last sentence in the first paragraph in the Poor Password Practices and Their Consequences section, with the sentence ending with and other well-known passwords. Insert the following article citation:
Author: Storm, Darlene
Title: Worst, Most Common Passwords for the Last 5 Years
Periodical Title: ComputerWorld
Year: 2016
Month: January
Day: 20
URL: http://www.computerworld.com/article/3024404
Note: Mac users do not need to add the URL.
Insert a citation to the same source before the period in the last sentence in the third paragraph on page 3, with the sentence ending with offline password managers are even free.
Click before the period at the end of the last sentence in the first paragraph of the Recommended Password Practices section, with the sentence ending with should not just be added to the end. Insert the following website citation:
Author: Schneier, Bruce
Name of Web Page: Choosing Secure Passwords
Name of Web Site: Schneier on Security
Year: 2014
Month: March
Day: 3
URL: https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html
Insert a footnote after the last password example in the Poor Password Practices section. Type the text: Common passwords as obtained from data breaches. (include the period.) Change the number format for footnotes to 1, 2, 3 in the Footnotes dialog box. (Click Apply, not Insert.)
Insert a blank page at the end of the report and insert a bibliography in APA style on the blank page with the title Works Cited. The bibliography should be double-spaced with no paragraph spacing before or after.
Ensure that bibliography is formatted with the Times New Roman font and 12 pt size, and that all text in the bibliography should be Black, Text 1 font color. Center the Works Cited title.
Insert the Ion (Light) cover page. Change the Year to 2020. Type Password Recommendations as the Document title. Type your first and last name as the Author. Delete the Document subtitle placeholder.
Create a table of contents, using the Classic style format with a dot leader, on a new page positioned between the cover page and the current page 2.
Insert a footer with a centered page number, using Banded format. Do not display the page number footer on the first page. Numbering begins with page 1 on the Table of Contents page.
Mark the following words as index entries, selecting Mark All for each: access control, rainbow tables, password manager, and phishing. Select the first occurrence of Offline password managers and set a cross-reference as See online password managers.
Note, please be sure to search your document to ensure that all occurrences are marked as specified; press CTRL+F and use the Navigation Pane to locate each one.
Add an index on a blank page at the end of the document. Use Classic format with 2 columns and accept all other default settings.
Save and close Exp19_Word_Ch04_HOEAssessment_Security.docx. Exit Word. Submit the file as directed.
Exp19_Word_Ch04_HOEAssessment_Security_Instructions.docx
Grader – Instructions Word 2019 Project
Exp19_Word_Ch04_HOEAssessment_Security
Project Description:
You are enrolled in a cyber security course at your local university. One of the assignments is to write a group paper with another student about password security. You and your partner conducted research on the topic and wrote a final draft of the report. Your partner has provided some feedback and suggestions, and you will review the feedback and make corrections to the paper where needed. You will also need to document the sources of the information used for the paper. You will use track changes, accepting and rejecting them as necessary, credit sources used in the preparation of the report, address your partner’s comments, include a table of contents and an index.
Steps to Perform:
Step |
Instructions |
Points Possible |
1 |
Start Word. Download and open the file named Exp19_Word_Ch04_HOEAssessment_Security.docx. Grader has automatically added your last name to the beginning of the filename. |
0 |
2 |
Apply the following formatting to the whole document: • Document is double-spaced. • The font is Times New Roman. • There is no paragraph spacing before or after any paragraph. • Margins are 1” at the top, bottom, left, and right. • Alignment is left. |
10 |
3 |
Ensure that All Markup view is displayed. On the first page, reject the replacement of the three words used, i.e., recognize, choices, and employed. Accept all other changes in the document and stop tracking. |
4 |
4 |
Modify the Title style to reflect the first comment left by your partner. Reply to the first comment by typing Adjusted Title style. (include the period.) and mark the comment as Resolved. Find the second comment which is in the Poor Password Practices section, and italicize the passwords as instructed in the comment, but not the commas. Mark the comment as Resolved. Create a new paragraph before the word Password as indicated by the third comment on page 3. Delete the comment. |
10 |
5 |
Change the Bibliography Style to APA Sixth Edition. Click before the period in the last sentence in the first paragraph in the Poor Password Practices and Their Consequences section, with the sentence ending with and other well-known passwords. Insert the following article citation: Author: Storm, Darlene Title: Worst, Most Common Passwords for the Last 5 Years Periodical Title: ComputerWorld Year: 2016 Month: January Day: 20 URL: http://www.computerworld.com/article/3024404 Note: Mac users do not need to add the URL. Insert a citation to the same source before the period in the last sentence in the third paragraph on page 3, with the sentence ending with offline password managers are even free. |
8 |
6 |
Click before the period at the end of the last sentence in the first paragraph of the Recommended Password Practices section, with the sentence ending with should not just be added to the end. Insert the following website citation: Author: Schneier, Bruce Name of Web Page: Choosing Secure Passwords Name of Web Site: Schneier on Security Year: 2014 Month: March Day: 3 URL: https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html |
6 |
7 |
Insert a footnote after the last password example in the Poor Password Practices section. Type the text: Common passwords as obtained from data breaches. (include the period.) Change the number format for footnotes to 1, 2, 3 in the Footnotes dialog box. (Click Apply, not Insert.) |
10 |
8 |
Insert a blank page at the end of the report and insert a bibliography in APA style on the blank page with the title Works Cited. The bibliography should be double-spaced with no paragraph spacing before or after. |
10 |
9 |
Ensure that bibliography is formatted with the Times New Roman font and 12 pt size, and that all text in the bibliography should be Black, Text 1 font color. Center the Works Cited title. |
0 |
10 |
Insert the Ion (Light) cover page. Change the Year to 2020. Type Password Recommendations as the Document title. Type your first and last name as the Author. Delete the Document subtitle placeholder. |
11 |
11 |
Create a table of contents, using the Classic style format with a dot leader, on a new page positioned between the cover page and the current page 2. |
10 |
12 |
Insert a footer with a centered page number, using Banded format. Do not display the page number footer on the first page. Numbering begins with page 1 on the Table of Contents page. |
8 |
13 |
Mark the following words as index entries, selecting Mark All for each: access control, rainbow tables, password manager, and phishing. Select the first occurrence of Offline password managers and set a cross-reference as See online password managers. Note, please be sure to search your document to ensure that all occurrences are marked as specified; press CTRL+F and use the Navigation Pane to locate each one. |
7 |
14 |
Add an index on a blank page at the end of the document. Use Classic format with 2 columns and accept all other default settings. |
6 |
15 |
Save and close Exp19_Word_Ch04_HOEAssessment_Security.docx. Exit Word. Submit the file as directed. |
0 |
Total Points |
100 |
Created On: 10/16/2019 1 Exp19_Word_Ch04_HOEAssessment – Security 1.2
Hasooni_Exp19_Word_Ch04_HOEAssessment_Security.docx
Password Recommendations Comment by Exploring Series: The font size should be 12 pt. without underline.
Introduction
The security and privacy of electronically stored data requires that access to that data is controlled. A username and password combination continues to be the most common form of access control. While more secure alternatives for authentication and authorization are available, passwords are easy to use and cost-effective to implement. Unfortunately, attackers know recognize that users have limitations when choosing passwords and that those limitations introduce vulnerabilities that they can take advantage of to gain illicit access.
In this paper, common poor practices and well-known vulnerabilities created by those practices are reviewed first. Next, the consequences of such vulnerabilities are described. Then a series of recommendations for password use are presented in a form that is easily understood by end-users. Finally, additional challenges are considered and a conclusion is offered.
Poor Password Practices and Their Consequences
Choosing a poor password has a number of potentially devastating outcomes for the security and privacy of your personal information. Users will frequently choose passwords that are short and easy to remember. A list of the most common passwords includes 123456, password, letmein, opensesame and other well-known passwordschoices. Comment by Exploring Series: Italicize the password examples.
Passwords that are short or common are not only easily guessed by a human attacker, but are even more easily broken by automated tools used employed by hackers. These tools are built to recover passwords using a variety of techniques, including dictionary searches, brute force, and rainbow tables. Passwords that are eight or fewer characters and contain no variations such as uppercase, digits or symbols, are cracked in a matter of seconds by ordinary computer hardware.
Another bad habit is reusing passwords. If you have created a strong password but have reused it across multiple systems, your data are at risk. This is a result of the fact that your password for a specific system is not only under your control, it’s also under the control of the system operator. A password can be considered a “shared secret.” Therefore, you implicitly rely on the system operator to take care to safeguard your password. Experience has shown that many systems handle passwords insecurely and it has led to massive caches of usernames and passwords published online. The availability of such lists provides opportunities for attackers to try to access systems whose operators protect passwords properly but are left vulnerable due to the disclosure of passwords from other systems.
Recommended Password Practices
The first line of defense is creating long, strong, and seemingly random passwords. Passwords should never be shorter than eight characters, but longer is always better. Always include a mix of lowercase letters, uppercase letters, digits, and symbols and have them in random places. For example, the uppercase letter should not just be the first character and the symbol should not just be tacked onadded to the end.
Equally important is the practice of “one system, one password.” For every user account on every system, you should have a unique password. This means that if you have user accounts on e-mail systems, banking web sites and online shopping sites, you will have as many different passwords than you do accounts.
Having so many complex passwords to create and track will soon become overwhelming, so the passwords and other details about the systems will inevitably need to be stored recorded somewhere. Writing down passwords on paper or storing them in a traditional computer file opens different avenues for abuse. To securely store passwords and other secrets, use a software application called a password manager. In its most basic form, a password manager is a tool used to create and protect a database of usernames and passwords and information about the system they apply to, such as the URL of a web site. Password managers are available in two broad categories: online and offline. Online password managers keep your database on Internet-connected servers operated by the maker of the password manager. Offline password managers save the password database on your computer. Online password managers have the advantage of providing access to your password on different devices, though those systems may themselves be targets of attackers. If you use an offline password, you can use other tools to transfer and synchronize your password database between different devices. Comment by Exploring Series: Start a new paragraph here.
Many passwords managers add user-friendly features, such as mobile applications, browser plug-ins to allow automatic form filling, and the ability to remind you when a password is getting stale, for example when it hasn’t been changed in a long time. Some of these features come at a premium price, but a password manager does not have to cost a lot to be good. Some highly regarded offline password managers are even free.
For some purposes, relying solely on a password manager may not be feasible. This applies to the master password that protects your password database and also to passwords you may need to enter frequently, such as your computer login password. To create strong passwords for those uses, think “passphrase” instead of password. Begin by thinking of a favorite phrase, such as a movie line, song lyric, or quote. You can then choose to obfuscate this phrase by substituting regular characters for symbols or digits, removing vowels, or adding punctuation characters.
The final recommended password practice is to keep your password secure and private at all times. You should never share your password, not even with trusted individuals. After all, you may trust them, but they may not practice safe passwords habits like you do. If you ever suspect that a password has been compromised, immediately change it and review your information on the affected system for any unauthorized changes.
Additional Challenges
No matter how conscientiously you protect your password and avoid re-use, there are times when passwords are compromised. For example, even the savviest Internet users can fall victim to phishing. Some of the recommended practices above can limit the negative impact of being phished, but some damage will be done. Security-minded system operators offer users an additional way to authenticate. This is referred to as two-factor or multi-factor authentication. Examples include sending a text message with a one-time code or asking for a constantly changing number that is generated by a smartphone app.
Attackers can bypass password security altogether by abusing self-service password reset provisions. Often, these provisions require providing answers to questions that only the legitimate user should know. Yet, the answers are often found online as part of social media profiles or are easily guessed. Attackers will not attempt to guess a password if it’s much easier to guess the reset answers. When required to provide one or more such answers, the best approach is to create random answers and store this in the password manager with the other information about that system.
Conclusion
Users must be aware that the passwords they create are keys to private information. Short or common passwords are easily recovered by automated tools. Password reuse can compromise different systems accessed by the same user. Information security can be enhanced significantly by creating random passwords using reputable password managers, which bring implementing the recommended best practices within reach of everyone.
Users should opt-in to use multi-factor authentication whenever offered by systems. The use of a second, independent authentication mechanism makes the password less sensitive and therefore less desirable for attackers.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.