Page 62 -
P. 62

your keyboard to the other person, and look away while she
                      Occasionally, an attacker will pretend to be an administra-  SeCUrity GUiDe  Passwords and Password Etiquette   61
                    tor and ask users for their passwords. You’ll never have to   enters the password. Among professionals working in orga-
                    give your password to a real administrator. He or she doesn’t   nizations that take  security  seriously, this little  “do-si-do”
                    need it and won’t ask for it. He or she already has full access   move—one person getting out of the way so another person
                    to all corporate computers and systems.            can enter her password—is common and accepted.
                       But what if you need someone else’s password? Sup-  If someone asks for your password, do not give it out.
                    pose,  for example,  you ask someone  to  help  you  with a   Instead, get up, go over to that person’s machine, and enter
                    problem on your computer. You sign on to an information   your own password yourself. Stay present while your pass-
                    system, and for some reason, you need to enter that other   word is in use, and ensure that your account is logged out at
                    person’s password. In this case, say to the other person, “We   the end of the activity. No one should mind or be offended in
                    need your password,” and then get out of your chair, offer   any way when you do this. It is the mark of a professional.












                                DiSCUSSion QUeStionS



                    1.  Here is a line from Shakespeare’s Macbeth: “Tomorrow   is  better to use different passwords for each. But in that
                      and tomorrow and tomorrow, creeps in its petty pace.”   case you have to remember three or four different pass-
                      Explain how to  use these lines to  create  a  password.   words. Think of different phrases you can use to create
                      How could  you add numbers and special charac-      a memorable, strong password for each of these differ-
                      ters to the password in a way that you will be able to   ent   accounts.  Relate the phrase to the purpose  of the
                       remember?                                            account. Show the passwords for each.
                    2.  List two different phrases that you can use to create a   4.  Explain proper behavior when you are using your com-
                      strong password. Show the password created by each.  puter and  you need  to enter, for some  valid reason,
                    3.  One of  the  problems of  life in  the cyberworld is  that     another person’s password.
                      we all are required  to  have multiple  passwords—one   5.  Explain proper behavior when someone else is using her
                      for work or school, one for bank accounts, another for   computer and that person needs to enter, for some valid
                      eBay or other auction sites, and so forth. Of course, it   reason, your password.
   57   58   59   60   61   62   63   64   65   66   67