CHAPTER2

Don’t Give Up Your Passwords

Keep the Keys Safe

Jackie, a newly hired HR database administrator (DBA) at a major state university, has several years’ professional experience working with big data. In her first week Jackie is “on-boarded” into the position. She is immediately granted full access to a large number of university systems and databases, which have disparate password and access requirements. Because of an absence of coherence across departments and university subunits (which is typical of large organizations), Jackie has to learn several new logon procedures for these assets. Some of the more sensitive systems at the university depend on “two-factor” authentication, requiring Jackie to use a physical identity (sometimes called ...

Get 10 Don'ts on Your Digital Devices: The Non-Techies Survival Guide to Cyber Security and Privacy now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.