a) Download a password cracker developed for your operating system. Run the cracker on your system. Describe the results from cracker. Do you have secure passwords over your system? What can be done to generate a more secure password?
b) An individual threat may be represented in more than one threat category. If the hacker hacks into the network, copies down the files, defaces the Web page, and steals the credit card numbers, specify the different threat categories this attack could cover?