CSC 379 SUM2008:Week 3, Group 3: Difference between revisions
Jump to navigation
Jump to search
(add of initial content) |
(→Costs and Benefits Password Regulations: add of links) |
||
Line 4: | Line 4: | ||
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred). | Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred). | ||
* | * [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839] | ||
* | * [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806] | ||
* | * [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370] | ||
* | * [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664] | ||
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836] |
Revision as of 20:15, 23 July 2008
Costs and Benefits Password Regulations
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits. An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency. Evaluate these popular password regulations. Do they provide adequate benefits for costs incurred? What ethical considerations do poorly evaluated “best practices” raise? Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted? A responsibility to re-evaluate existing practices?
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).