a) Please discuss Password construction Guidelines technology-specific security policy to review this week (e.g. email policy). Once you reach consensus, report and justify your findings.
b) Search online (or perhaps at your workplace) for a real-life example of the Password construction Guidelines technology-specific security policy specified above (e.g. email policy).
c) Review and benchmark the policies provided in your findings. Discuss the following questions:
1) What are the key similarities and differences among the policies?
2) What are the key strengths and weaknesses of each policy?
3) Which of the policies would you consider to be the best example among them?