Professional Documents
Culture Documents
Learning Aim B Cyber Security: Worksheet 3 User Restrictions
Learning Aim B Cyber Security: Worksheet 3 User Restrictions
Learning Aim B Cyber Security: Worksheet 3 User Restrictions
Task 1
(a) Go to https://www.betterbuys.com/estimating-password-cracking-times/
For each of the passwords in the table below, complete the columns to show the password
length, which types of character are used in the password and how long it will take for a
computer to crack the password. The first example has been completed for you.
(b) Think of a password you have used in the past and you NO LONGER use. Write the
password below along with how long it would take one computer to crack. If you cannot
think of a password you have previously used then make one up.
Password: John
(c) Give three rules which help to make strong passwords that are difficult to crack.
1
Worksheet 3 User restrictions
Learning Aim B Cyber Security
(d) The password ‘equivalency’ will take around 7 years to crack using a brute-force method.
Explain why this password may be cracked far faster.
2
Worksheet 3 User restrictions
Learning Aim B Cyber Security
Task 2
(a) The following table contains six scenarios. Tick which factor(s) of authentication are being
used. The first one has been completed for you.
(b) Describe another computer system that requires you to authenticate yourself in order to
use it.
Vein recognition
3
Worksheet 3 User restrictions
Learning Aim B Cyber Security
Task 3
(a) Go to the website https://wigle.net. This website records access point (AP) names and their
unique MAC addresses.
(b) Search for a place you know such as your home, school or restaurant. Note down three of
the access point names and their MAC addresses.
Afsgs.net Fagsggs.net
Font/sa Fefe/ea
frafafa
(c) Discuss with your friends or class whether you have found any Wi-Fi networks which you
recognise.
4
Worksheet 3 User restrictions
Learning Aim B Cyber Security
Task 4
The screenshot below shows output from software used for penetration testing Wi-Fi networks.
Look at the output and the key below.
Key
CH Channel
(b) How many networks has the penetration software found nearby?
5
Worksheet 3 User restrictions
Learning Aim B Cyber Security
(c) What is(are) the network name(s) that do not use encryption, making them vulnerable to
man-in-the-middle attacks?
(d) Which network(s) is(are) using a weak encryption which is easy for a hacker to crack?
(e) Suggest three areas other than Wi-Fi which penetration may try to test for weaknesses. For
each area, explain how the vulnerability would be fixed if found.
1.
2.
3.