SlideShare uma empresa Scribd logo
1 de 31
Security & Privacy
NC PARAPROFESSIONAL CONFERENCE
MAY 2017
1
Amanda McLellan
Head of Applications and Digital Services
East Carolina University
2
Educating Ourselves and Our Patrons
(P.S. The other half of the battle is sharing what we know)
3
Security
4
Threats
5
Threats
Malware
◦ Viruses
◦ Worms
◦ Trojans
◦ Bots
◦ Spyware
Mal-People
◦ Hackers (Financial data, Healthcare data, personal data)
◦ Spoofers (including Catfishers)
◦ Scammers
◦ Identity Thieves
6
Prevention is the best medicine
Image: https://pixnio.com/objects/signs/wash-your-hands-sign
7
Updates!
8
Anti-Virus
•Best Paid: http://www.techradar.com/news/the-best-antivirus-software-of-2017
•Best Free: http://www.techradar.com/news/the-best-free-antivirus
9
Browser plugins
10
Backup your information
11
Strong Passwords
Unique to each site
Combination of Uppercase, lowercase, numbers and special characters
12
Utilize a Password Manager
Read more: http://thewirecutter.com/reviews/best-password-managers/ and
http://www.pcmag.com/article2/0,2817,2407168,00.asp
13
Two Factor authentication
Something you know + something you have
14
Your Mobile Device
15
Has my email been compromised?
https://hacked-emails.com/
16
“Because our digital identities
are so interconnected,
providing access to a single
account can often give hackers
access to others.”
PETER FERNANDEZ
17
Social Engineering Attacks
Image from: https://www.webroot.com/blog/2017/03/21/common-social-engineering-attacks/
18
Recognizing phished and spoofed sites
19
Privacy
20
What do they do with all that info?
21
22
Jen Golbeck
The Curly Fry Conundrum
https://www.ted.com/talks/jennifer_golbeck_the_curly_fry_conundrum_why_social_media_likes_say
_more_than_you_might_think
23
Internet of Things
24
Digital in 2017: Global Overview
https://wearesocial.com/blog/2017/01/digital-in-2017-global-overview
25
Feeling like this?
26
Privacy vs Customization
27
Private Browsing & Searching
28
Privacy and Libraries
http://www.ala.org/advocacy/privacy/toolkit
29
Further Reading - websites
•Hoffman, Chris. “Basic Computer Security: How to Protect Yourself from
Viruses, Hackers, and Thieves.” How-To Geek, 4 Apr. 2017,
www.howtogeek.com/173478/10-important-computer-security-
practices-you-should-follow/.
•Kiser, Matt. “The Normal Person's Guide to Internet Security.” GitHub,
30 Mar. 2017,
http://github.com/mkiser/WTFJHT/blob/master/guide/internet-
security.md.
•Pinola, Melanie. “Top 10 Tech Security Basics Every Person Should
Follow.” Lifehacker, Lifehacker.com, 26 Mar. 2016, lifehacker.com/top-
10-tech-security-basics-every-person-should-follow-1767148925.
30
Further Reading - Articles
• Breeding, Marshall. "High Security and Flexible Privacy for Library Services." Computers in Libraries, vol. 36, no.
5, June 2016, pp. 12-15. EBSCOhost.
• Fortier, Alexandre and Jacquelyn Burkell. "Hidden Online Surveillance: What Librarians Should Know to Protect
Their Own Privacy and That of Their Patrons." Information Technology & Libraries, vol. 34, no. 3, Sept. 2015,
pp. 59-72. EBSCOhost.
• Fernandez, Peter. "Through the Looking Glass: Helping Patrons Manage Passwords and Protect Their Digital
Identities." Library Hi Tech News, vol. 33, no. 9, Oct. 2016, pp. 1-5. EBSCOhost, doi:10.1108/LHTN-09-2016-
0041.
• Gressel, Michael1. "Are Libraries Doing Enough to Safeguard Their Patrons’ Digital Privacy?." Serials Librarian,
vol. 67, no. 2, Sept. 2014, pp. 137-142. EBSCOhost, doi:10.1080/0361526X.2014.939324.
• Macrina, Alison. "Protecting Patron Privacy." Library Journal, vol. 141, no. 12, 7/1/2016, pp. 38-39. EBSCOhost.
• Massis, Bruce. "The Internet of Things and Its Impact on the Library." New Library World, vol. 117, no. 3/4,
Mar. 2016, pp. 289-292. EBSCOhost, doi:10.1108/NLW-12-2015-0093.
• Nichols Hess, Amanda, et al. "Preserving Patron Privacy in the 21St Century Academic Library." Journal of
Academic Librarianship, vol. 41, no. 1, Jan. 2015, pp. 105-114. EBSCOhost, doi:10.1016/j.acalib.2014.10.010.
• West, Jessamyn. "Cybersecurity as an Extension of Privacy in Libraries." Computers in Libraries, vol. 36, no. 5,
June 2016, pp. 24-25. EBSCOhost.
31

Mais conteúdo relacionado

Semelhante a Security and privacy - Paraprofessional Conference

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptxER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptxMatthew Ragucci
 
UKSG 2023 - Cybersecurity 101: What every librarian needs to know about prot...
UKSG 2023 - Cybersecurity 101:  What every librarian needs to know about prot...UKSG 2023 - Cybersecurity 101:  What every librarian needs to know about prot...
UKSG 2023 - Cybersecurity 101: What every librarian needs to know about prot...UKSG: connecting the knowledge community
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016suresh sood
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30minKim Aarenstrup
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarMarty Miller
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpointcarlyxxjo55
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Internet Freedom Festival Recap, 2016
Internet Freedom Festival Recap, 2016Internet Freedom Festival Recap, 2016
Internet Freedom Festival Recap, 2016Robert Stribley
 
CACR Overview
CACR OverviewCACR Overview
CACR OverviewVon Welch
 
Digital libraries with ict and innovation
Digital libraries with ict and innovationDigital libraries with ict and innovation
Digital libraries with ict and innovationMaykin Likitboonyalit
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
On the personalization of event-based systems
On the personalization of event-based systems On the personalization of event-based systems
On the personalization of event-based systems Opher Etzion
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart datacaniceconsulting
 
Social Networking Sites And Digital Reference Services Version 02
Social  Networking  Sites And  Digital  Reference  Services Version 02Social  Networking  Sites And  Digital  Reference  Services Version 02
Social Networking Sites And Digital Reference Services Version 02Mark-Shane Scale ♞
 
Social Network Sites and Digital Reference Services
Social Network Sites and Digital Reference ServicesSocial Network Sites and Digital Reference Services
Social Network Sites and Digital Reference ServicesMark-Shane Scale ♞
 
SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniquesijistjournal
 
Jeffrey Evans Presentation
Jeffrey Evans PresentationJeffrey Evans Presentation
Jeffrey Evans PresentationMediabistro
 

Semelhante a Security and privacy - Paraprofessional Conference (20)

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Hanson In Defense of the Proxy Server
Hanson In Defense of the Proxy ServerHanson In Defense of the Proxy Server
Hanson In Defense of the Proxy Server
 
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptxER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
 
UKSG 2023 - Cybersecurity 101: What every librarian needs to know about prot...
UKSG 2023 - Cybersecurity 101:  What every librarian needs to know about prot...UKSG 2023 - Cybersecurity 101:  What every librarian needs to know about prot...
UKSG 2023 - Cybersecurity 101: What every librarian needs to know about prot...
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Internet Freedom Festival Recap, 2016
Internet Freedom Festival Recap, 2016Internet Freedom Festival Recap, 2016
Internet Freedom Festival Recap, 2016
 
CACR Overview
CACR OverviewCACR Overview
CACR Overview
 
Digital libraries with ict and innovation
Digital libraries with ict and innovationDigital libraries with ict and innovation
Digital libraries with ict and innovation
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
On the personalization of event-based systems
On the personalization of event-based systems On the personalization of event-based systems
On the personalization of event-based systems
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
 
Social Networking Sites And Digital Reference Services Version 02
Social  Networking  Sites And  Digital  Reference  Services Version 02Social  Networking  Sites And  Digital  Reference  Services Version 02
Social Networking Sites And Digital Reference Services Version 02
 
Social Network Sites and Digital Reference Services
Social Network Sites and Digital Reference ServicesSocial Network Sites and Digital Reference Services
Social Network Sites and Digital Reference Services
 
SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniques
 
Jeffrey Evans Presentation
Jeffrey Evans PresentationJeffrey Evans Presentation
Jeffrey Evans Presentation
 

Mais de Amanda McLellan

NC Paraprofessional 2019 - How To Ask Better Questions
NC Paraprofessional 2019 - How To Ask Better QuestionsNC Paraprofessional 2019 - How To Ask Better Questions
NC Paraprofessional 2019 - How To Ask Better QuestionsAmanda McLellan
 
Turning Technofear to Technojoy
Turning Technofear to TechnojoyTurning Technofear to Technojoy
Turning Technofear to TechnojoyAmanda McLellan
 
Online Adjunct Faculty Orientation
Online Adjunct Faculty OrientationOnline Adjunct Faculty Orientation
Online Adjunct Faculty OrientationAmanda McLellan
 
What do you mean i can’t use wikipedia
What do you mean i can’t use wikipediaWhat do you mean i can’t use wikipedia
What do you mean i can’t use wikipediaAmanda McLellan
 
Facebook Privacy and Security
Facebook Privacy and SecurityFacebook Privacy and Security
Facebook Privacy and SecurityAmanda McLellan
 

Mais de Amanda McLellan (9)

NC Paraprofessional 2019 - How To Ask Better Questions
NC Paraprofessional 2019 - How To Ask Better QuestionsNC Paraprofessional 2019 - How To Ask Better Questions
NC Paraprofessional 2019 - How To Ask Better Questions
 
Turning Technofear to Technojoy
Turning Technofear to TechnojoyTurning Technofear to Technojoy
Turning Technofear to Technojoy
 
Online Adjunct Faculty Orientation
Online Adjunct Faculty OrientationOnline Adjunct Faculty Orientation
Online Adjunct Faculty Orientation
 
What do you mean i can’t use wikipedia
What do you mean i can’t use wikipediaWhat do you mean i can’t use wikipedia
What do you mean i can’t use wikipedia
 
Email Etiquette Script
Email Etiquette ScriptEmail Etiquette Script
Email Etiquette Script
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Facebook Privacy and Security
Facebook Privacy and SecurityFacebook Privacy and Security
Facebook Privacy and Security
 
Facebook for Education
Facebook for EducationFacebook for Education
Facebook for Education
 
Hartman Summit 09
Hartman Summit 09Hartman Summit 09
Hartman Summit 09
 

Último

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Último (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Security and privacy - Paraprofessional Conference

  • 1. Security & Privacy NC PARAPROFESSIONAL CONFERENCE MAY 2017 1
  • 2. Amanda McLellan Head of Applications and Digital Services East Carolina University 2
  • 3. Educating Ourselves and Our Patrons (P.S. The other half of the battle is sharing what we know) 3
  • 6. Threats Malware ◦ Viruses ◦ Worms ◦ Trojans ◦ Bots ◦ Spyware Mal-People ◦ Hackers (Financial data, Healthcare data, personal data) ◦ Spoofers (including Catfishers) ◦ Scammers ◦ Identity Thieves 6
  • 7. Prevention is the best medicine Image: https://pixnio.com/objects/signs/wash-your-hands-sign 7
  • 12. Strong Passwords Unique to each site Combination of Uppercase, lowercase, numbers and special characters 12
  • 13. Utilize a Password Manager Read more: http://thewirecutter.com/reviews/best-password-managers/ and http://www.pcmag.com/article2/0,2817,2407168,00.asp 13
  • 14. Two Factor authentication Something you know + something you have 14
  • 16. Has my email been compromised? https://hacked-emails.com/ 16
  • 17. “Because our digital identities are so interconnected, providing access to a single account can often give hackers access to others.” PETER FERNANDEZ 17
  • 18. Social Engineering Attacks Image from: https://www.webroot.com/blog/2017/03/21/common-social-engineering-attacks/ 18
  • 19. Recognizing phished and spoofed sites 19
  • 21. What do they do with all that info? 21
  • 22. 22
  • 23. Jen Golbeck The Curly Fry Conundrum https://www.ted.com/talks/jennifer_golbeck_the_curly_fry_conundrum_why_social_media_likes_say _more_than_you_might_think 23
  • 25. Digital in 2017: Global Overview https://wearesocial.com/blog/2017/01/digital-in-2017-global-overview 25
  • 28. Private Browsing & Searching 28
  • 30. Further Reading - websites •Hoffman, Chris. “Basic Computer Security: How to Protect Yourself from Viruses, Hackers, and Thieves.” How-To Geek, 4 Apr. 2017, www.howtogeek.com/173478/10-important-computer-security- practices-you-should-follow/. •Kiser, Matt. “The Normal Person's Guide to Internet Security.” GitHub, 30 Mar. 2017, http://github.com/mkiser/WTFJHT/blob/master/guide/internet- security.md. •Pinola, Melanie. “Top 10 Tech Security Basics Every Person Should Follow.” Lifehacker, Lifehacker.com, 26 Mar. 2016, lifehacker.com/top- 10-tech-security-basics-every-person-should-follow-1767148925. 30
  • 31. Further Reading - Articles • Breeding, Marshall. "High Security and Flexible Privacy for Library Services." Computers in Libraries, vol. 36, no. 5, June 2016, pp. 12-15. EBSCOhost. • Fortier, Alexandre and Jacquelyn Burkell. "Hidden Online Surveillance: What Librarians Should Know to Protect Their Own Privacy and That of Their Patrons." Information Technology & Libraries, vol. 34, no. 3, Sept. 2015, pp. 59-72. EBSCOhost. • Fernandez, Peter. "Through the Looking Glass: Helping Patrons Manage Passwords and Protect Their Digital Identities." Library Hi Tech News, vol. 33, no. 9, Oct. 2016, pp. 1-5. EBSCOhost, doi:10.1108/LHTN-09-2016- 0041. • Gressel, Michael1. "Are Libraries Doing Enough to Safeguard Their Patrons’ Digital Privacy?." Serials Librarian, vol. 67, no. 2, Sept. 2014, pp. 137-142. EBSCOhost, doi:10.1080/0361526X.2014.939324. • Macrina, Alison. "Protecting Patron Privacy." Library Journal, vol. 141, no. 12, 7/1/2016, pp. 38-39. EBSCOhost. • Massis, Bruce. "The Internet of Things and Its Impact on the Library." New Library World, vol. 117, no. 3/4, Mar. 2016, pp. 289-292. EBSCOhost, doi:10.1108/NLW-12-2015-0093. • Nichols Hess, Amanda, et al. "Preserving Patron Privacy in the 21St Century Academic Library." Journal of Academic Librarianship, vol. 41, no. 1, Jan. 2015, pp. 105-114. EBSCOhost, doi:10.1016/j.acalib.2014.10.010. • West, Jessamyn. "Cybersecurity as an Extension of Privacy in Libraries." Computers in Libraries, vol. 36, no. 5, June 2016, pp. 24-25. EBSCOhost. 31

Notas do Editor

  1. Introduce self
  2. So why is this discussion important? Well, we interact with technology every day. And not everyone has the same access to information, or interest in keeping up with what can be an overwhelming topic. Increasingly, libraries are one of the only places many of our patrons can go to learn about things like security and privacy. Also I’ve filled this presentation with pop culture references and animated gifs. If this annoys you – my preemptive apologies.
  3. So, let’s start with security. Security in libraries is multi-faceted. It includes things like security personnel, surveillance cameras, tattle-tape and RFID tags. For the purposes of today’s talk, we’re primarily focused on the social and digital aspects of security.
  4. Malware: any program designed to enter a computer and compromise its data or processes. Includes: Viruses: self-replicating, come in attached to other files. Worms: self-replication, can spread with no user assistance, enter through security holes in browsers, as attachments, or bad links. Trojans: do something other than the intended function. Often used as keyloggers for passwords or other personal information. Bot: receives instructions from 3rd party, not always malicious. Spyware: collects personal information.
  5. The good news is that most threats can be prevented. You’re taking the first step here today – you’re learning about what’s out there and how to protect yourself. Practicing safe computing means taking a look before you leap or think before you click attitude. Or, if you prefer, we can apply “Trust but Verify”. We’re going to cover some of the ways you can protect yourself.
  6. The number one thing you can do to keep your computer safe is to keep your computer updated. For most people, that means turning on automatic updates, keeping your software updated, and making sure you’re using the latest version of your operating system. This is true regardless if you’re a mac, windows, or other OS user.
  7. Beneficial for most users, but pick ONE. You can pay for an anti-virus, but there are some good free versions out there. I personally use a free version, but you can read the reviews and
  8. Install an ad blocker. I use Ublock origin, but there are others. You can disable it on a page-by-page basis, and, as a head’s up – if your page is loading weird, try disabling it.
  9. Preferably automatically – save everything on a networked drive if your institution offers that service. There are many services for cloud backup, but both Windows and Mac offer built in tools to automate backups. I always recommend that important data, like family photos, are backed up in several places. If your computer is compromised for any reason, you won’t lose everything if you have it backed up.
  10. Passwords are imperfect. The easier they are for us to remember, the easier they are to hack. However, for the time being, they are a big part of our world. So you need to learn to use good passwords! Avoid dictionary words or identifying personal information. Use mixed character sets. Different passwords for different places Consider using a password manager, such as LastPass, for an added layer of security.
  11. I have a couple of links here for reviews of password managers. There are many options out there, but they way they work is that you can store all of your passwords in an encrypted database, so that you only have to remember a singular master password. I personally use LastPass, which has a mobile application and browser plugins, but there are many other options available. Most password managers will also generate good secure passwords for you.
  12. How many people have heard of two-factor authentication? The way it works is once it is enabled on say your email, when you enter your password, you will also need to provide a code. The code could be texted to you, or generated by an app like authy or the google code generator. Two factor authentication makes it very difficult to gain access to your private information unless someone also has your phone.
  13. Password protect! Face recognition? Fingerprint? Anti-Virus? Track the device if it’s lost Even better if you can remotely disable
  14. You can use a website like https://hacked-emails.com/ to see if your email has been attached to accounts known to have the passwords leaked. If the answer is YES – don’t panic. Change your password on the hacked site, and change your password on your email.
  15. False friend requests, phone scams, craigslist, dating, etc. Be suspicious – don’t click links that seem off or too good to be true. Also – don’t be ashamed if you are tricked – remember it happened to former CIA director John Brennan. A very common attack on Facebook and similar social media networks is to get a friend request from someone who is already your friend. The second request is from someone who is NOT your friend, but has taken their photo and is going through their friends list and adding each one. The next thing they usually do is private message the friends, saying they need help, please send money. When you get a request like this, a) do not friend the second profile b) check to make sure your friend knows and report the fraudulent page and, most effectively, c) go to your privacy settings and make it so only you can see your friends list. This means that even if a malperson gets access to your page through spoofing or other means, they won’t know who your friends are, effectively ending their scam.
  16. You have probably seen warnings from IT not to believe emails telling you that you need to change your password. Spoofers are getting really good at sending emails that seem real. One trick is to look closely at the email address of the sender, and ensure it doesn’t have anything odd or misspelled. Websites can also be spoofed. The URL of this website is NOT www.facebook.com – and if you were to put your username and password in here, the The FBI estimates that between October 2013 and August 2015, email spoofing cost American businesses over $1.2 Billion
  17. Okay. This is the part of the presentation where I get to scare you. I have more bad news for you… everything you do online is tracked. A lot of what you do in real life is tracked too. Credit Cards Phone GPS
  18. What is done with this info? Mostly it’s used to sell you stuff. If you google something, you’ll see ads for it or competition. Target story
  19. Good rule of thumb is that if you aren’t paying for a service, you’re the product.   Many social networks and Internet-based tools (such as search engines) don’t require you to pay any money to use them. However, the Internet companies that run these services are often allowed to collect and sell information generated by your public Internet activities while using them (though, before you panic, this does not include sensitive identity and financial information). These include links that you click on, keywords that you search for, information that you post in public spaces (such as public profile information or status updates)… even your Internet address, which can be used to figure out where you are in the world, is fair game. This is why you will sometimes see advertisements on websites for products or services that have something to do with other places that you have been or other things that you have done on the Internet.   Deleting various elements of your Internet browsing history can hamper this process somewhat, as can using privacy-friendly custom Internet browsers and search engines
  20. ”In 2013, research company Gartner predicted more than 26 billion connected devices will be in use by 2020.” (Massis) Currently, we’re estimated to be using about 8.4 billion. http://www.gartner.com/newsroom/id/3598917
  21. Sometimes these features are useful. Using data, you can learn about books or music or other products that you might never have found otherwise. So it’s a balance – you can choose to sacrifice privacy for convenience, that’s a personal decision for you to make. When making these decisions for your patrons, if possible, give them options. For example, if your ILS allows them to save their patron record, if possible, make that an opt-in option, so they (in theory) can read about the risks associated with that. If you’re concerned about privacy, there’s some tools you can use.   1. Be extra mindful of privacy when using social networks. They can’t use or sell what you don’t post.
  22. Many popular Internet browsers have a “private browsing” mode, but it doesn’t protect your privacy on the Internet as much as many people assume that it does. “Private browsing” simply deletes all Internet tracking records (such as your browsing history, cache, and cookies) from your computer when you close your browser, but only for that browser, and only for that session. In that sense, “private browsing” really only protects your privacy from other people who use your computer and Internet browser.   What “private browsing” doesn’t protect your privacy from are entities that track and collect information about your Internet activities while you’re still browsing. These can include governments, website owners, data collection companies, and even some overly-nosy individuals. If you really want to make your online activities private, consider using a custom private Internet browser that uses technical tricks to block or interfere with data tracking and collection. A few choices include Epic Privacy Browser, T.O.R. (The Onion Router), and Comodo Dragon. We just mentioned that many search engines trade being free-to-use for the ability to track, collect, and sell publicly-generated Internet data. Well, there are some search engines that don’t do this. They remain free-to-use while finding ways to make money that don’t involve spying on what you search for and selling that information to others (such as non-targeted advertising and donations from supporters).   Also, because these search engines don’t keep track of what you search for, you won’t get different search results if you search for the same keywords multiple times. This is something that can happen with more common search engines, as they use your past search terms to predict what kind of results you might want to see in future searches.   Some popular “private search engines” include DuckDuckGo, StartPage, and Disconnect Search. You can also use an app that encrypts your text messages, like Signal, especially recommended for Android users. If you’re really concerned, you can pay for or set up a VPN, a Virtual Private Network, to help disguise your internet activity.
  23. Libraries have been dealing with privacy issues for a long time, well before the Patriot Act. What are some things libraries can do to help protect patron privacy? Work with Powers that Be (IT, etc) to make sure all software is kept up to date. Get a good Antivirus software suite for your institution, and make sure it is set up to scan every USB plugged into it. Make TOR available on public workstations (but not the default browser) Clear all patron data after every session Offer sessions to learn about privacy and security issues