Cybersecurity Brainstorming: Difference between revisions
Jump to navigation
Jump to search
(New page: This page reflects the brainstorming and discussion of the cybersecurity group in [http://en.wikipedia.org/wiki/Jonathan_Zittrain Jonathan Zittrain]'s Cyberlaw: Difficult Problems Class. ...) |
No edit summary |
||
Line 10: | Line 10: | ||
*rejecting weak passwords | *rejecting weak passwords | ||
*require keystrokes for weak passwords (rejecting autofill) | *require keystrokes for weak passwords (rejecting autofill) | ||
*using recaptcha or pictures, etc as dual key for all passwords | *using recaptcha or pictures (esp game), etc as dual key for all passwords | ||
==Mesh Network Vaccination== | ==Mesh Network Vaccination== |
Revision as of 22:03, 12 January 2010
This page reflects the brainstorming and discussion of the cybersecurity group in Jonathan Zittrain's Cyberlaw: Difficult Problems Class.
Problems to Tackle
Password Protection
- encrypted password storage within browser
- rejecting weak passwords
- require keystrokes for weak passwords (rejecting autofill)
- using recaptcha or pictures (esp game), etc as dual key for all passwords
Mesh Network Vaccination
Stop Badware
Presentational ideas
- "This is your internet, this is your internet on botnet"
- Ham Sandwich metaphor acted out in reality
- Voiceover puppets a la JZ's video explanation of Herdict
- PSA Announcement featuring Internationally Recognized Magician Michael Feldman