1.The number of strings in the password=9.
The total number of alphabets = 26.
Hence, the possible number of password combinations =26C9 = 3124550
Time required to test one password= 1mS.
Hence, the total time required for 3124550 passwords= 3124550mS = 3124.550 seconds.
2.The computer security can be challenged in various ways by a number of programs (Pieprzyk, Hardjono & Seberry, 2013).
Firstly, the Botnets can challenge the security of the computers in a dangerous way. The botnets are generally robots that can create a group of malware for infecting the computers. These programs can spam the mails of the computer by attaching the infected files to the mails. IN addition to this, they also spread the malwares throughout the system. In addition to this it also aids the other malwares that cause the denial of service attacks.
Secondly, there are the denial of service malwares. This programs generally fills the memory of the computer with useless information. As a result affects the performance of the computer. These processes can block the installation of several other processes on the computer. In addition to this, there processes that blocks the other installed processes in the computer.
Thirdly, there are the Pharming processes. These deviates the user from performing essentially on the system. In addition to this, they redirect the users to the wrong locations even though the user enters the correct URL. This can restrict the users from reaching the original addresses on the system.
3.In the provided situation, where the system security allows a malicious program to allow access to the system information, the developer of the operating system should be held responsible to the utmost level (Dautenhahn et al., 2015). The developer of the system is responsible for developing an efficient system, although the developer also has the responsibility to ensure the security of a system that he is developing. The system development cycle involves the testing phase here the security of the system should be given equal importance. The developer should define certain processes within the systems that would disallow the malware programs or the unidentified programs from having access to the systems. Although, the user can also be held responsible to a certain extent for interfering with the recommended setting of the system but the major responsibility would be on the developer of the operating System.
4.It the responsibility of the owner of the house to lock the house in such a way that no kind of intruder can enter the house (shin et al., 2014). Although morally it is incorrect to have unauthorized access to someone else’s property, but the main responsibility of the security of the house lies on the owner of the house. In the similar context in case of a computing system the security of the system lies solely on the hands of the owner of the system. This because the responsibility of the hacker is completely eliminated if the system is properly secured.
Dautenhahn, N., Kasampalis, T., Dietz, W., Criswell, J., & Adve, V. (2015). Nested kernel: An operating system architecture for intra-kernel privilege separation. ACM SIGPLAN Notices, 50(4), 191-206.
Murata, A., & Ohta, Y. (2013). Role of Metacognition in Mathematical Problem Solving Process of Permutations and Combinations-Basic Study for CAI Software Development. Computer Technology and Application, 4(6).
Pieprzyk, J., Hardjono, T., & Seberry, J. (2013). Fundamentals of computer security. Springer Science & Business Media.
Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., ... & Kang, B. B. (2014, November). Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 78-89). ACM.