Page 57 - Using MIS
P. 57

and ask users for their passwords. You’ll never have to give   enters the password. Among professionals working in orga-
            your password to a real administrator. He or she doesn’t   nizations  that  take  security  seriously,  this  little  “do-si-do”
            need it and won’t ask for it. He or she already has full access   move—one person getting out of the way so another person
            to all corporate computers and systems.              can enter her password—is common and accepted.
               But what if you need someone else’s password?        If someone asks for your password, do not give it out.
            Suppose, for example, you ask someone to help you with a   Instead, get up, go over to that person’s machine, and en-
            problem on your computer. You sign on to an information   ter your own password yourself. Stay present while your
            system, and for some reason, you need to enter that other   password is in use, and ensure that your account is logged
            person’s password. In this case, say to the other person, “We   out at the end of the activity. No one should mind or be
            need your password,” and then get out of your chair, offer   offended in any way when you do this. It is the mark of a
            your keyboard to the other person, and look away while she   professional.















                        DisCussion Questions



            1.  Here is a line from Shakespeare’s Macbeth, “Tomorrow   to use different passwords for each. But in that case you
              and tomorrow and tomorrow, creeps in its petty pace.”   have to remember three or four different passwords.
              Explain how to use these lines to create a password.   Think of different phrases you can use to create a memo-
              How could you add numbers and special characters     rable,  strong password  for  each  of  these  different  ac-
              to the password in a way that you will be able to    counts. Relate the phrase to the purpose of the account.
              remember?                                            Show the passwords for each.
            2.  List  two  different  phrases  that  you  can  use  to  create  a   4.  Explain proper behavior when you are using your com-
              strong password. Show the password created by each.  puter and you need to enter, for some valid reason, an-
            3.  One of the problems of life in the cyberworld is that we   other person’s password.
              all  are required to  have multiple  passwords—one  for   5.  Explain proper behavior when someone else is using her
              work or school, one for bank accounts, another for eBay   computer and that person needs to enter, for some valid
              or other auction sites, and so forth. Of course, it is better   reason, your password.














                                                                                                                  25
   52   53   54   55   56   57   58   59   60   61   62