Compare brute-force attacks and dictionary attacks.

What will be an ideal response?

Brute-force attacks take place by guessing passwords and keys. Potential intruders use a brute-force approach to guess encryption keys - that is, using every possible combination of characters until the correct one is found. This type of attack can crack any key, given the time to do so. By contrast, a dictionary attack uses a dictionary file to try to guess a user's password. This type of attack is limited to words supplied in the dictionary file, so the password might never be discovered. A brute-force attack, on the other hand, uses all combinations of characters until a key is found, although doing so might take considerable time.

Computer Science & Information Technology

You might also like to view...

It is best to use the ____ available text editor when writing Java programs.

A. most complex B. simplest C. best D. latest

Computer Science & Information Technology

Describe how to insert a table with four columns and seven rows into the middle of a document. The orientation of the page with the table should be landscape, but the rest of the document should use portrait orientation. Also make sure that the width of the table columns is adjusted to fit the table's text and the window.

What will be an ideal response?

Computer Science & Information Technology