It is the process to gain unauthorized access to restricted systems by using common passwords. In other words, this is to obtain the correct password which gives access to the system that is protected by an authentication method.
Discuss how it works
This is done by either guessing the password repeated usually through computer algorithm where the computer tries numerous combinations until the password is successfully discovered.
Provide example of the test
Discuss the solution if there is vulnerability after a test
- Make a strong password that cannot be detect or guess by anyone
- Apply an auto-lock to the account if any of the attempt to unlock the system is incorrect
- Make sure that every account has different password
- Change your password frequently
Produce an audit document showing the range of tests on IT systems and networks (eg LANs/WANs and wireless networks)
References:
No comments:
Post a Comment