Page 57 - Using MIS
P. 57
and ask users for their passwords. You’ll never have to give enters the password. Among professionals working in orga-
your password to a real administrator. He or she doesn’t nizations that take security seriously, this little “do-si-do”
need it and won’t ask for it. He or she already has full access move—one person getting out of the way so another person
to all corporate computers and systems. can enter her password—is common and accepted.
But what if you need someone else’s password? If someone asks for your password, do not give it out.
Suppose, for example, you ask someone to help you with a Instead, get up, go over to that person’s machine, and en-
problem on your computer. You sign on to an information ter your own password yourself. Stay present while your
system, and for some reason, you need to enter that other password is in use, and ensure that your account is logged
person’s password. In this case, say to the other person, “We out at the end of the activity. No one should mind or be
need your password,” and then get out of your chair, offer offended in any way when you do this. It is the mark of a
your keyboard to the other person, and look away while she professional.
DisCussion Questions
1. Here is a line from Shakespeare’s Macbeth, “Tomorrow to use different passwords for each. But in that case you
and tomorrow and tomorrow, creeps in its petty pace.” have to remember three or four different passwords.
Explain how to use these lines to create a password. Think of different phrases you can use to create a memo-
How could you add numbers and special characters rable, strong password for each of these different ac-
to the password in a way that you will be able to counts. Relate the phrase to the purpose of the account.
remember? Show the passwords for each.
2. List two different phrases that you can use to create a 4. Explain proper behavior when you are using your com-
strong password. Show the password created by each. puter and you need to enter, for some valid reason, an-
3. One of the problems of life in the cyberworld is that we other person’s password.
all are required to have multiple passwords—one for 5. Explain proper behavior when someone else is using her
work or school, one for bank accounts, another for eBay computer and that person needs to enter, for some valid
or other auction sites, and so forth. Of course, it is better reason, your password.
25