Robert Burns, “A Red, Red Rose

essay should include an introductory paragraph, a thesis statement, body paragraphs, and a conclusion.

 

 

 

Security Guide PASSWORDS AND PASSWORD ETIQUETTE

Many forms of computer security use passwords to control access to systems and data. Most likely, you have a university account that you access with a username and password. When you set up that account, you were probably advised to use a “strong password.” That’s good advice, but what is a strong password? Probably not “sesame,” but what then?

Microsoft, a company that has many reasons to promote effective security, provides the following guidelines for creating a strong password. A strong password should:

• Have at least 10 characters; 12 is even better

• Not contain your username, real name, or company name

• Not contain a complete dictionary word in any language

• Be different from previous passwords you have used

• Contain both upper- and lowercase letters, numbers, and special characters (such as ~ ! @; # $ % ^ &; * ( ) _+; – =; { } | [ ] : “ ; ‘ <; >;? , ./)

Examples of good passwords are:

• Qw37^T1bb?at

• 3B47qq<3>5!7b

The problem with such passwords is that they are nearly impossible to remember. And the last thing you want to do is write your password on a piece of paper and keep it near the device where you use it. Never do that!

One technique for creating memorable, strong passwords is to base them on the first letter of the words in a phrase. The phrase could be the title of a song or the first line of a poem or one based on some fact about your life. For example, you might take the phrase, “I was born in Rome, New York, before 2000.” Using the first letters from that phrase and substituting the character < for the word before, you create the password IwbiR,NY<2000. That’s an acceptable password, but it would be better if all of the numbers were not placed on the end. So, you might try the phrase, “I was born at 3:00 AM in Rome, New York.” That phrase yields the password Iwba3:00AMiR,NY which is a strong password that is easily remembered.

Once you have a strong password you want to avoid reusing the same password at every site you visit. Not all sites provide the same level of protection for your data. In fact, sometimes they lose your password to hackers. Then hackers can use those passwords to access other sites that you regularly use. Password variety is your friend. Never use the same password for less important sites (e.g., social networking) that you’d use to access more important sites (e.g., online banking).

You also need to protect your password with proper behavior. Never write down your password, do not share it with others, and never ask others for their passwords. Occasionally an attacker will pretend to be an administrator and ask users for their passwords. You’ll never have to give your password to a real administrator. He or she doesn’t need it and won’t ask for it. He or she already has full access to all corporate computers and systems.

But what if you need someone else’s password? Suppose, for example, you ask someone to help you with a problem on your computer. You sign on to an information system, and for some reason, you need to enter that other person’s password. In this case, say to the other person, “We need your password,” and then get out of your chair, offer your keyboard to the other person, and look away while she enters the password. Among professionals working in organizations that take security seriously, this little “do-si-do” move—one person getting out of the way so another person can enter her password—is common and accepted.

If someone asks for your password, do not give it out. Instead, get up, go over to that person’s machine, and enter your own password yourself. Stay present while your password is in use, and ensure that your account is logged out at the end of the activity. No one should mind or be offended in any way when you do this. It is the mark of a professional.

DISCUSSION QUESTIONS

1.  Here is a line from Shakespeare’s Macbeth, “Tomorrow and tomorrow and tomorrow, creeps in its petty pace.” Explain how to use these lines to create a password. How could you add numbers and special characters to the password in a way that you will be able to remember?

2.  List two different phrases that you can use to create a strong password. Show the password created by each.

3. Explain proper behavior when you are using your computer and you need to enter, for some valid reason, another person’s password.

Cite five peer-reviewed journal articles on HIPAA regulations that have been published in the last five years and answer the following questions.

4. What does HIPAA contain that relates to privacy of information?

5. How does working from home affect complying with regulations and ethical behavior?

 

 

 

 

4.2 – Written Assignment (Due Wednesday, 11:59 p.m. CST) (100 points):

This written assignment requirement is a minimum of 5 double-spaced pages of text, submitted in APA format, using 12 point font. In addition, your paper should include a cover page, abstract and reference page. A minimum of 2 scholarly sources must be used. Provide the following information and post your assignment as a .doc file attachment to the link provided for Assignment 4.2.

Based on three scenarios below, write an essay that explains the context in which behavior could be considered ethical or not, based on the ethical approaches to decision making.

1. An overly ambitious investigator fabricates data to strengthen his/her case against an internal theft investigation.
2. During an interview, an investigator utilizes deceptive interrogation tactics to solicit a confession from a white collar crime.
3. During the course of a narcotics investigation, an undercover detective misuses confidential information in an effort to take down the trafficking enterprise.

 

 

 

 

Read Mark Cuban
Read Before I die
Read Zaslow introduced Pausch

Watch Randy Pausch Last Lecture

Watch Po Bronson at

What is the point? …answer in 10 sentences or less

 

 

 

Is this question part of your Assignment?

We can help

Our aim is to help you get A+ grades on your Coursework.

We handle assignments in a multiplicity of subject areas including Admission Essays, General Essays, Case Studies, Coursework, Dissertations, Editing, Research Papers, and Research proposals

Header Button Label: Get Started NowGet Started Header Button Label: View writing samplesView writing samples