Cybersecurity Brainstorming: Difference between revisions

From Cyberlaw: Difficult Issues Winter 2010
Jump to navigation Jump to search
(New page: This page reflects the brainstorming and discussion of the cybersecurity group in [http://en.wikipedia.org/wiki/Jonathan_Zittrain Jonathan Zittrain]'s Cyberlaw: Difficult Problems Class. ...)
 
No edit summary
Line 10: Line 10:
*rejecting weak passwords
*rejecting weak passwords
*require keystrokes for weak passwords (rejecting autofill)
*require keystrokes for weak passwords (rejecting autofill)
*using recaptcha or pictures, etc as dual key for all passwords
*using recaptcha or pictures (esp game), etc as dual key for all passwords


==Mesh Network Vaccination==
==Mesh Network Vaccination==

Revision as of 22:03, 12 January 2010

This page reflects the brainstorming and discussion of the cybersecurity group in Jonathan Zittrain's Cyberlaw: Difficult Problems Class.

Whiteboard Notes Part 1
Mesh Network Vaccination / Password Protection Ideas
Whiteboard Notes Part 2
Ideas for Incentivizing
Whiteboard Notes Part 3
Stop Badware Ideas

Problems to Tackle

Password Protection

  • encrypted password storage within browser
  • rejecting weak passwords
  • require keystrokes for weak passwords (rejecting autofill)
  • using recaptcha or pictures (esp game), etc as dual key for all passwords

Mesh Network Vaccination

Stop Badware

Presentational ideas

  • "This is your internet, this is your internet on botnet"
  • Ham Sandwich metaphor acted out in reality
  • Voiceover puppets a la JZ's video explanation of Herdict
  • PSA Announcement featuring Internationally Recognized Magician Michael Feldman