Page 62 -
P. 62
your keyboard to the other person, and look away while she
Occasionally, an attacker will pretend to be an administra- SeCUrity GUiDe Passwords and Password Etiquette 61
tor and ask users for their passwords. You’ll never have to enters the password. Among professionals working in orga-
give your password to a real administrator. He or she doesn’t nizations that take security seriously, this little “do-si-do”
need it and won’t ask for it. He or she already has full access move—one person getting out of the way so another person
to all corporate computers and systems. can enter her password—is common and accepted.
But what if you need someone else’s password? Sup- If someone asks for your password, do not give it out.
pose, for example, you ask someone to help you with a Instead, get up, go over to that person’s machine, and enter
problem on your computer. You sign on to an information your own password yourself. Stay present while your pass-
system, and for some reason, you need to enter that other word is in use, and ensure that your account is logged out at
person’s password. In this case, say to the other person, “We the end of the activity. No one should mind or be offended in
need your password,” and then get out of your chair, offer any way when you do this. It is the mark of a professional.
DiSCUSSion QUeStionS
1. Here is a line from Shakespeare’s Macbeth: “Tomorrow is better to use different passwords for each. But in that
and tomorrow and tomorrow, creeps in its petty pace.” case you have to remember three or four different pass-
Explain how to use these lines to create a password. words. Think of different phrases you can use to create
How could you add numbers and special charac- a memorable, strong password for each of these differ-
ters to the password in a way that you will be able to ent accounts. Relate the phrase to the purpose of the
remember? account. Show the passwords for each.
2. List two different phrases that you can use to create a 4. Explain proper behavior when you are using your com-
strong password. Show the password created by each. puter and you need to enter, for some valid reason,
3. One of the problems of life in the cyberworld is that another person’s password.
we all are required to have multiple passwords—one 5. Explain proper behavior when someone else is using her
for work or school, one for bank accounts, another for computer and that person needs to enter, for some valid
eBay or other auction sites, and so forth. Of course, it reason, your password.