This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Security by Checklist
March/April 2008 (vol. 6 no. 2)
pp. 88
Steve Bellovin, Columbia University
We've all seen the checklists with suggestions for how to secure your system. Many of us have even written them. (I have.) The problem is that security is more complicated than that, and checklists—especially if followed slavishly or enforced without thought—can make matters worse.

1. A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, vol. 37, no. 6, 2004, pp. 62–67.

Index Terms:
security, passwords, security checklists, Clear Text
Citation:
Steve Bellovin, "Security by Checklist," IEEE Security & Privacy, vol. 6, no. 2, pp. 88, March-April 2008, doi:10.1109/MSP.2008.43
Usage of this product signifies your acceptance of the Terms of Use.