Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are encouraged) in PDF format through Blackboard using the following file name format: LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten. All the assignments in this course are individual work; any overlap between assignment reports will be penalized. A bank requires for their customers to access their online banking accounts to provide as User Id (or user name) the last 8 digits of their bank card number, and a password with a length between 8 and 12 ASCII characters, including the following restrictions (posted on their website): Passwords must have at least 8 characters long and at most 12 characters long, and must include at least one character from each of the following four character types: Upper case letters ABC DEF Lower case letters ghijkl Numbers 1 2 345 67890 Special characters ! @ # $ % ^ & * (+) = - The remaining characters of the password must be selected from the above character set (and can be from any of the character type). For example, an acceptable password sample is gB21@hill while gPanth2! and A@a#CDEF&* will be considered unacceptable (with respect to the prescribed format). The bank also requires that each password be changed at least once every five years. 1. Assume that 1,000,000 passwords can be tested per second, calculate the probability that a hacker can guess a password in the timeframe between two consecutive changes.. 2. A hacker controls a network of compromised machines (botnet) that can be used to launch the attack. The network consists of 500,000 compromised machines (bots) located in different countries around the globe. Assume that the machines have approximately the same computing capability. The hacker uses a simple strategy consisting of slicing the username space in subsets of equal size, and assigning a subset to each of the bots to conduct the attack in parallel. Calculate the probability that a successful password guess can be obtained in the timeframe between two consecutive changes. Briefly comment the results In order to strengthen the above password scheme, the bank investigates the following two different solutions:

A Guide to SQL
9th Edition
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Philip J. Pratt
Chapter7: Database Administration
Section: Chapter Questions
Problem 3SCG: Create a view named CONDO_FEES. It consists of two columns: the first is the square footage, and the...
icon
Related questions
icon
Concept explainers
Question
Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are
encouraged) in PDF format through Blackboard using the following file name format:
LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten.
All the assignments in this course are individual work; any overlap between assignment reports will be
penalized.
A bank requires for their customers to access their online banking accounts to provide as
User Id (or user name) the last 8 digits of their bank card number, and a password with a
length between 8 and 12 ASCII characters, including the following restrictions (posted on
their website):
Passwords must have at least 8 characters long and at most 12 characters long, and must include at least
one character from each of the following four character types:
Upper case letters ABC DEF
Lower case letters ghijkl
Numbers 1 2 345 67890
Special characters ! @ # $ % ^ & * (+) = -
The remaining characters of the password must be selected from the above character set (and can be from
any of the character type).
For example, an acceptable password sample is gB21@hill while gPanth2! and A@a#CDEF&* will be
considered unacceptable (with respect to the prescribed format).
The bank also requires that each password be changed at least once every five years.
1. Assume that 1,000,000 passwords can be tested per second, calculate the
probability that a hacker can guess a password in the timeframe between two
consecutive changes..
2. A hacker controls a network of compromised machines (botnet) that can be used
to launch the attack. The network consists of 500,000 compromised machines
(bots) located in different countries around the globe. Assume that the machines
have approximately the same computing capability. The hacker uses a simple
strategy consisting of slicing the username space in subsets of equal size, and
assigning a subset to each of the bots to conduct the attack in parallel. Calculate
the probability that a successful password guess can be obtained in the timeframe
between two consecutive changes. Briefly comment the results
In order to strengthen the above password scheme, the bank investigates the following
two different solutions:
Transcribed Image Text:Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are encouraged) in PDF format through Blackboard using the following file name format: LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten. All the assignments in this course are individual work; any overlap between assignment reports will be penalized. A bank requires for their customers to access their online banking accounts to provide as User Id (or user name) the last 8 digits of their bank card number, and a password with a length between 8 and 12 ASCII characters, including the following restrictions (posted on their website): Passwords must have at least 8 characters long and at most 12 characters long, and must include at least one character from each of the following four character types: Upper case letters ABC DEF Lower case letters ghijkl Numbers 1 2 345 67890 Special characters ! @ # $ % ^ & * (+) = - The remaining characters of the password must be selected from the above character set (and can be from any of the character type). For example, an acceptable password sample is gB21@hill while gPanth2! and A@a#CDEF&* will be considered unacceptable (with respect to the prescribed format). The bank also requires that each password be changed at least once every five years. 1. Assume that 1,000,000 passwords can be tested per second, calculate the probability that a hacker can guess a password in the timeframe between two consecutive changes.. 2. A hacker controls a network of compromised machines (botnet) that can be used to launch the attack. The network consists of 500,000 compromised machines (bots) located in different countries around the globe. Assume that the machines have approximately the same computing capability. The hacker uses a simple strategy consisting of slicing the username space in subsets of equal size, and assigning a subset to each of the bots to conduct the attack in parallel. Calculate the probability that a successful password guess can be obtained in the timeframe between two consecutive changes. Briefly comment the results In order to strengthen the above password scheme, the bank investigates the following two different solutions:
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Query Syntax
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
A Guide to SQL
A Guide to SQL
Computer Science
ISBN:
9781111527273
Author:
Philip J. Pratt
Publisher:
Course Technology Ptr
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781305627482
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:
9781337508841
Author:
Carey
Publisher:
Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:
9780357392676
Author:
FREUND, Steven
Publisher:
CENGAGE L
Oracle 12c: SQL
Oracle 12c: SQL
Computer Science
ISBN:
9781305251038
Author:
Joan Casteel
Publisher:
Cengage Learning