KEMBAR78
Assignment 1 | PDF | Password | Security Technology
0% found this document useful (0 votes)
34 views1 page

Assignment 1

The assignment focuses on understanding and implementing best practices for creating secure passwords, including their importance, characteristics, common attacks, and management tips. It includes a practical activity for testing password strength and creating a secure password policy for employees. Evaluation criteria are provided to assess understanding, explanation of attacks, completion of tasks, and clarity of organization.

Uploaded by

RISHI KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views1 page

Assignment 1

The assignment focuses on understanding and implementing best practices for creating secure passwords, including their importance, characteristics, common attacks, and management tips. It includes a practical activity for testing password strength and creating a secure password policy for employees. Evaluation criteria are provided to assess understanding, explanation of attacks, completion of tasks, and clarity of organization.

Uploaded by

RISHI KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Assignment 1

To understand and implement best practices for creating secure passwords, ensuring protection
against cyber threats, and applying forensic techniques to assess password strength.

Part 1: Research & Report

Importance of Secure Passwords – Why are strong passwords necessary?

Characteristics of a Strong Password – Length, complexity, uniqueness, etc.

Common Password Attacks – Explain brute force, dictionary attacks, phishing, etc.

Best Practices for Password Management – Tips for creating, storing, and updating passwords.

Two-Factor Authentication (2FA) – Explain its role in security.

Practical Activity

Password Strength Testing:

Use an online password strength checker (e.g., "howsecureismypassword.net") to test different


passwords.

Document at least 3 examples (weak, moderate, strong) and explain why they have different
strengths.

Create a Secure Password Policy:

Draft a set of guidelines for a company’s employees to follow for secure password creation and
management.

Needs
Satisfactory (6-5
Criteria Excellent (10-9 pts) Good (8-7 pts) Improvement (4- Points
pts)
0 pts)

Good
Understanding of Clear, detailed, Basic Unclear or
explanation, /25
Secure Passwords with examples. understanding. missing.
lacks depth.

Explains attacks Covers main


Password Attacks Mentions attacks Incorrect or
and security points, lacks /25
& Protection but unclear. missing.
measures well. depth.

Completes all tasks


Practical Activity Completes tasks Minimal effort or Incomplete or
with strong /25
(Testing & Policy) but lacks detail. missing parts. missing.
explanations.

Clarity & Well-structured, Mostly clear, Somewhat unclear,


Poorly organized. /25
Organization easy to read. minor issues. errors present.

You might also like