Part 1, Book: Security Awareness: Applying Practical Security in Your World, 5th Edition — ISBN 9781305500372 Complete the following tasks for Chapter 2. Submit any work through this drop box as requested below: (Only Projects 2-2, 2-3, and 2-4 are optional. Projects 2-1, 2-5 are assigned).

1. Project 2-1 – Pages 65-66 – This is very interesting exercise that will demonstrate how easily hashes can be de-crypted. You will first create a hash value and then will use a tool to quickly de-crypt the hash.

Complete steps 1-23. (If possible, have a stop watch nearby to calculate the requested times). Save your answers for steps 19, 20 and 21. You may need them during the chapter quiz. Do a print screen of your output for step 18. Name this print screen step 18.

2. Project 2-5 – Pages 70-71 – In this exercise you will generate a password. As part of the exercise you will use to create a fictitious email account. You can use entirely made-up information when creating this account.

Complete steps 1-20 (if you completed the optional tasks above you may want to complete steps 21 and 22). Answer the following questions based on your experience with this tool:

Would you use this tool for personal or business accounts? Yes or No? Explain your answer.

Part 2: 200 words same book as part 1, 2 sources which would be the sites used
Provide the answers to the questions from Case Project 2-1 (Pages 72-73). Please do not provide the passwords used, only the answers to the questions. Choose two of the three websites provided.

a. List the 2 sites you used for this task.

b. How secure are your passwords?

c. In your opinion would any of these tools encourage someone to create a stronger password? Why? Explain your answer.

d. Which site provided the best information?