Question

Suppose a computer's login mechanism first asks for a user name, and then for the password,...

Suppose a computer's login mechanism first asks for a user name, and then for the password, regardless of whether or not the login name is that of a valid user. Herman the Hacker has a list of 10,000 commonly used login names, and a list of 100,000 commonly used passwords. On this computer, there are 100 accounts that have both a login name on the first list and a password on the second list. For simplicity, assume that no other accounts have either a login name or password on these lists.

Herman has written code that can attempt 1000 logins per second on this computer. This program repeatedly chooses a random login name from the first list and a random password from the second list. Compute the expected number of seconds it will take Herman to break into some account on the machine, and identify that number from the list below.

Hint: Since names and passwords are chosen randomly, repetitions are possible. It may indeed be easier to forget what names/passwords have been tried than to keep a list of what has been tried and avoid duplicate attempts. As a result, there is an easy formula for the expected number of tries. If the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1/p.

A. 1.1
B. 100.1
C. 10,000
D. 1000.1

(Thank you for the help!)

Homework Answers

Answer #1

Here we have 10,000 login names among them we can assume 100 are correct as the question suggest .

So,

the probablity of getting the correct login name is P​​​​​​1 = 100 ÷ 10,000 = 0.01

Similarly Among 100,000 password we can assume only 100 are correct

So,

the probability of getting correct password is. P 2 = 100 ÷ 100,000 = 0.001

As we have

If the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1 ÷ P.

So,

expected number of tries when we get the first success in login name is = 1÷ P1​​​​​1 = 1 ÷ 0.01 = 100

Similarly for password : 1÷ P2 = 1 ÷ 0.001 =1000

So we have to do 100+1000 =1100 number of tries to get the first login name and password

As,

Henrietta has written code that can attempt 1000 logins per second on this computer.

So

the expected number of seconds it will take Henrietta to break into some account on the machine is 1100 ÷ 1000 sec = 1.1 sec

So the answers A 1.1 sec is correct.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
A hacker has a list of 10,000 commonly used login names, and a list of 100,000...
A hacker has a list of 10,000 commonly used login names, and a list of 100,000 commonly used passwords. On this computer, there are 100 accounts that have both a login name on the first list and a password on the second list. For simplicity, assume that no other accounts have either a login name or password on these lists. The hacker has written code that can attempt 1000 logins per second on this computer. This program repeatedly chooses a...
Scenario: A computer system allows a user to choose a password with a length of one...
Scenario: A computer system allows a user to choose a password with a length of one to eight characters. A system administrator needs to figure out how long a user’s password should expire. Assume that 1 million passwords can be tested per second by a hacker. The hacker can guess a user’s password 24 hours a day and 7 days a week. A password should be expired if it has an equal or greater than 10% probability of having been...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
Use Python 3.8: Problem Description Many recipes tend to be rather small, producing the fewest number...
Use Python 3.8: Problem Description Many recipes tend to be rather small, producing the fewest number of servings that are really possible with the included ingredients. Sometimes one will want to be able to scale those recipes upwards for serving larger groups. This program's task is to determine how much of each ingredient in a recipe will be required for a target party size. The first inputs to the program will be the recipe itself. Here is an example recipe...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas competitors....
CASE 3.2 Horizon Consulting Patti Smith looked up at the bright blue Carolina sky before she...
CASE 3.2 Horizon Consulting Patti Smith looked up at the bright blue Carolina sky before she entered the offices of Horizon Consulting. Today was Friday, which meant she needed to prepare for the weekly status report meeting. Horizon Consulting is a custom software development company that offers fully integrated mobile application services for iPhonetm, Androidtm, Windows Mobile® and BlackBerry® platforms. Horizon was founded by James Thrasher, a former marketing executive, who quickly saw the potential for digital marketing via smartphones....
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how the firms resources incompetencies support the given pressures regarding costs and local responsiveness. Describe entry modes have they usually used, and whether they are appropriate for the given strategy. Any key issues in their global strategy? casestudy: Atlanta, June 17, 2014. Sea of Delta employees and their families swarmed between food trucks, amusement park booths, and entertainment venues that were scattered throughout what would...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From the April 2004 Issue Save Share 8.95 In 1991, Progressive Insurance, an automobile insurer based in Mayfield Village, Ohio, had approximately $1.3 billion in sales. By 2002, that figure had grown to $9.5 billion. What fashionable strategies did Progressive employ to achieve sevenfold growth in just over a decade? Was it positioned in a high-growth industry? Hardly. Auto insurance is a mature, 100-year-old industry...