Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. Describe 3 types of weaknesses in systems that hackers use to access to your personal information on the internet.
- Hackers exploit the databases for passwords, as well as the customer service and email or phone accounts
- 2. Describe how to make a ‘strong password’.
- Must be random and have a wide variety of characters and be a decently long length
- 3. When deciding on a strong password to use on the internet, what is the ‘trade-off’? In other words, you must compromise between what two issues when creating a strong password?
- Privacy and ease of access
- 4. Summarize the history of password hacking in a short paragraph. (see page 2 of article).
- Hacking at first was very easy since there was no need to protect the data, however, as data became more important, hacking became harder and has since become a battle of protection vs hacking.
- 5. Define these vocabulary words:
- (helpful websites are http://www.webopedia.com/ and http://www.techterms.com/
- Algorithm (p.4)
- Formula for solving a problem
- Keylogger (p.4)
- Records key presses and is used to get passwords
- Phishing (p.5)
- fake links that often look like real sites used to get information from people
- Authentication (p.5)
- using another method to verify an account
- Prolific (p.6)
- plentiful
- Malware (p.6)
- Programs that retrieve information or cause harm to someone's computer
- IP Address (p.8)
- A unique address given to a computer to identify it
- Biometrics (p.9)
- authentication using unique attributes like finger print or voice
- Anomaly (p.9)
- something that deviates from what is standard, normal, or expected:
- Fraud (p.9)
- deception for one's own gain
- 6. On page 6, the author states that “teenagers are, if anything, scarier, because they’re so innovative”. What is your personal reaction to this portion of the article?
- I agree with this statement actually since most teens are creative and those who can use their knowledge in hacking can break into almost anything.
- 7. According to the author, what are some motives for password hackers?
- For fun or for getting important information off of people.
- 8. The article mentions Kevin Mitnick ( see p. 9). Research on the internet and describe what he is most famous for.
- He is famous for performing high profile hacks and getting arrested and tried for his actions.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement