3-2 ScenarioSouthern New Hampshire UniversityIT-549 03:48:03 GMT -05:00ï‚· Alice sends a password, and Bob compares it against a database of passwords.Transmitting a password via plain text is inherently insecure, as it exposes the password to anyone who might access your communications. Simply entering the password and sending it permits anyone with visibility into your communication method to obtain that password, potentially facilitating an attack. A viable solution to this issue is to employ hashing and salting techniques for the password. Hashing the password provides a more efficient and secure means of storage compared to plain text, rendering it nearly unreadable to humans. Additionally, salting the password involves appending an extra piece of data to it prior to hashing (Arias, 2018). This combination of salting and hashing effectively renders any lookup table ineffective.ï‚· Alice sends a password, and Bob hashes it and compares it against a database of hashed passwords.Hashing a password ensures that it is never reverted to its original plain text form; however, it still permits an attacker to potentially access the password. Furthermore, the password is transmitted in plain text and subsequently hashed by the recipient. Consequently, if an attacker can intercept the communication, they