Username correct answers A unique name used for identification in a computer system or website.
Password correct answers A secret combination of letters, numbers, and/or symbols that ideally only the user would know.
Password Weakness correct answers Difficult to remember, must remember multi...
Security Awareness || Already Graded A+.
Username correct answers A unique name used for identification in a computer system or
website.
Password correct answers A secret combination of letters, numbers, and/or symbols that ideally
only the user would know.
Password Weakness correct answers Difficult to remember, must remember multiple passwords
for multiple accounts.
Weak Password correct answers Uses common words, short password, a predictable sequence of
characters, or personal information. Also reuses same password for other accounts.
123456 correct answers Number one most common password
Online guessing correct answers The attacker attempts to randomly guess the password by typing
different variations at the password login prompt.
Offline cracking correct answers Attacker steal the file of password digests and then use their
own powerful computers to break the password. The attacker creates their own passwords and
then generating digests for these password. They compare their digests to their stolen digests.
Brute force attack correct answers A password attack in which every possible combination of
letters, numbers, and characters is used to match passwords in a stolen password file. Slowest
method but most thorough method.
Dictionary attack correct answers A password attack that com-pares common dictionary words
against those in a stolen password fil
Unexpected Email correct answers Social Engineering Attack: An unanticipated email
containing a link or a file attachment. Clicking on the link is the action, result could be computer
may become infected with malware
Urgent plea of help correct answers Social Engineering Attack: An email from an acquaintance
saying needs money immediately and wants to wire money. Sending the money to account is the
action, result could be sending it to the attacker's account.
Text Message Warning correct answers Social Engineering Attack: Receive a text message on a
phone saying call the number to give your social security number, bank info, etc. Provide bank
information is the action, result could be attacker now has card information.
Disaster Video correct answers Social Engineering Attack: A website about a recent weather
incident that asks the user to donate for the people affected by the event. Action could be
download video to computer, result would be could contain malware.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.