0% found this document useful (0 votes)
4 views

Computer Security 2

The document is an assignment for a computer security course focusing on authentication and access control issues. It poses questions regarding shared computer security risks, the impossibility of perfect computer security, and calculations related to brute force attacks on passwords. Additionally, it explores the implications of case sensitivity in password security across different systems.

Uploaded by

bevonomwenga17
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Security 2

The document is an assignment for a computer security course focusing on authentication and access control issues. It poses questions regarding shared computer security risks, the impossibility of perfect computer security, and calculations related to brute force attacks on passwords. Additionally, it explores the implications of case sensitivity in password security across different systems.

Uploaded by

bevonomwenga17
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CIS 4360 Introduction to Computer Security

Home Assignment 3, Fall 2010

This concerns the basic requirements for Authentiaction and Access Control.

1. The police and the public defender share a computer. What security problems does this
present? Do you feel that it is a reasonable cost-saving measure to have all public agencies
share the same (set of) computers?

2. A respected computer scientist has said that no computer can ever be made perfectly secure.
Why might she have said this?

3. Assume that passwords have length six and that all alphanumerical characters, upper and
lower case, can be used in their construction. How long will a brute force attack take on
average if:

(a) it takes one tenth of a second to check a passord?


(b) it takes a microsecond to check a password?

4. Assume that you are only allowed to use the 26 characters from the alphabet to construct
passwords of length n. Assume further that you are using the same password in two systems
A, B, where system A accepts case sensitive passwords but system B does not.

(a) How many attempts (worst case) are required to guess a password of system A (case
sensitive).
(b) How many attempts (worst case) are required to guess a password of system B (not case
sensitive).
(c) Suppose a hacker has succeeded in guessing your password in system B (not case sensi-
tive). How many attempts (worst case) are required by the hacker to guess your password
of system A (case sensitive).

Mike Burmester

You might also like