SlideShare uma empresa Scribd logo
1 de 56
IT Security For Librarians
Blake Carver
LYRASIS Systems Administrator
Week One: Intro
Who and How and What
Privacy & Security in general
Why this is all important
5 Basic Things
Week Two: Outrunning The Bear
Privacy
Passwords
Securing Devices
Web Browsers
Email
Staying Safe On-line (General Tips)
Week Three: Outrunning The Bear @ Your Library
Training: Thinking & Behavior
Threat modeling
Hardware and networks
Week Four: Websites & Everything Else!
Web Servers and Networks
Backups
Drupal and Wordpress and Joomla
Servers in general
Everything You Need To Know
• Use Good Passwords
• Stay Paranoid & Vigilant
• Use Routine Backups
• Keep Everything Patched / Updated
• Think Before You Share Or Connect
Intro
Other Things
l Install Updates NOW
l Passwords are Key
l ALL Software Has Flaws
l Security Is Complicated
l Everyone Plays A Part
Common Security Myths
• You have nothing worth stealing
• Patches and updates make things worse and
break them
• You can look at a web site and know it's safe
• No one will guess this password
• Social Media Sites Are Safe
• I’m safe! I use Anti-virus / firewall
• There’s only malware on Desktops not phones
• If I'm compromised I will know it
• I'm too smart to get infected
Intro
Common Security Excuses
• But nobody would do that [Exploit Method/Thing]
• I can't remember all these passwords.
• Firewalls / AV / Security just gets in the way
• They won't be able to see that; it's hidden.
• It's safe because you have to log in first.
Intro
So What Are We Talking About
● ● ● ● ● ● ● ●
Intro
The Way Things Are
Vs.
The Way Things Oughtta Be
But the state argued that because cell phones constantly reveal their locations to carriers
by pinging nearby cell towers, Andrews “voluntarily shared this information with third
parties,” including the police, merely by keeping his phone on.
In other words, if you don't shut off your phone, you're asking to be
tracked.
“While cell phones are ubiquitous, they all come with 'off' switches,” the state responded in
the brief. “Because Andrews chose to keep his cell phone on, he was voluntarily sharing the
location of his cell phone with third parties.”
“The government has indeed repeatedly argued that there is no [reasonable
expectation of privacy] in cell phone location information, in court and
out,” Nathan Wessler, a staff attorney with the ACLU's speech, privacy and technology
project, told Motherboard in an email. “In cases involving historical cell site location
information, the government has danced around this argument, arguing that phone users
give up their expectation of privacy in their location information merely by making and
receiving calls.”
State of MD Vs Kerron Andrews
If
Vs.
When
Somethings are IFs, somethings are WHENs
Perhaps things are Likely and Possible
● ● ● ● ● ● ● ●
Bad Guys?
Hackers?
Crackers?
Criminals?
Intro
● ● ● ● ● ● ● ●
Security
Cyber Security?
IT Security?
Safety?
Information Security?
Information Literacy?
The Digital Divide?
Intro
“Security is two different things:
It's a feeling &
It's a reality ”
Bruce Schneier – TedxPSU
Intro
Security isn’t either/or
Intro
● ● ● ● ● ● ● ●
Privacy
Cyber Privacy?
IT Privacy?
Online Privacy?
Information Literacy?
The Digital Divide?
Intro
What will be the consequences
of participation in this data set?
https://github.com/frankmcsherry/blog/blob/master/posts/2016-02-06.md
Are we helping people avoid being added to
more and more datasets?
Are we increasing their digital foot prints?
Security & Privacy
are, Getting Better,
But they're Getting
Worse
FasterIntro
Why does this keep happening?
The Internet was built for openness and speed
More Things Online – More Targets
Old, out-of-date systems and budget shortfalls
New poorly designed systems
Surveillance is the business of the Internet
Why?
Professionals
Intro
And Everyone Else
Good Guys
Bad Guys
Skill
Focus
Tools
Time
Training
Not much of this crime is new
Automation
Distance
"Technique Propagation"
(“Only the first attacker has to be skilled; everyone else can use his software.”)
Intro
The technology of the internet
makes the bad guys vastly more
efficient.
Intro
It's Safe Behind The Keyboard
Hacking is a really safe crime.
Comparatively. To other real life crime
Intro
Where Are They Working?
• Social Networks
• Search Engines
• Advertising
• Email
• Web Sites
• Web Servers
• Home Computers
• Mobile Devices
Intro
This is the work of a rogue
industry, not a roguish teenager
Intro
*Thanks to Brian Krebs for sharing screenshots:
krebsonsecurity.com
And to Dr. Mark Vriesenga, BAE systems
Examples
Intro
What Are They After?
• PINs
• Passwords
• Credit Cards
• Bank Accounts
• Usernames
• Contact Lists
• Emails
• Phone Numbers
• Your Hardware...
Intro
http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/?utm_source=feedburn
Personal information is the
currency of the underground
economy
Intro
Personal information is the
currency of the entire Internet
economy
Intro
What's It Worth?Credit Cards: $5-$30
Basic or “Random” $5-$8
With Bank ID# $15
With Date of Birth $15
With Fullzinfo $30
Payment service accounts: $20-$300
containing from US$400 to $1,000 between $20 and $50
containing from $5,000 to $8,000 range from $200 to $300
Bank login credentials: $190-$500
A $2,200 balance account selling for $190.
$500 for a $6,000 account balance, to $1,200 for a $20,000 account balance
Online premium content services: $.55-$15
Online video streaming($0.25 to $1)
premium cable channel streaming services ($7.50)
premium comic book services ($0.55)
professional sports streaming ($15)
Loyalty, community accounts: $20-$1400
A major hotel brand loyalty account with 100,000 points for sale for $20
An online auction community account with high reputation marks priced at $1,400
"The Hidden Data Economy" study by MacAfee October 2015
http://www.symantec.com/connect/blogs/netflix-malware-and-phishing-campaigns-help-build-emerging-black-market
The Era Of Steal Everything
Everything has some value
Intro
Against a sufficiently motivated
and equipped adversary, no
device is impenetrable.
Intro
There is no such thing as a
secure computer
Intro
We are making things safER
Intro
"None of this is about being
"unhackable"; it’s about making
the difficulty of doing so not
worth the effort."
Intro
Intro
https://www.teachprivacy.com/the-health-data-breach-and-id-theft-epidemic/
Think Different…
Have A Hacker Mindset
Have A Security Mindset
Intro
http://www.pewinternet.org/files/2015/09/2015-09-15_libraries_FINAL.pdf
Offer Training At Your Library
Everything You Need To Know
Use Great Passwords
Strong (Long, Complex)
Unique
Stay Paranoid & Vigilant
Never Trust Anything or Anyone
Always Double Check
Intro
http://r20.rs6.net/tn.jsp?f=001jvkK1lqM8L-
mnPV6fw1piqSVbRdreWE37hHyBgaBTEokTgb93wOt2pbbtbQeU8ZfnvfAHeCyovnJECU5iJW3x398
D3y1CUWJo46vMRcq7SmXgKmSTao6BDOeyWbDL098sbwrd31tthC8vO7UtQTs-Dpvy-
FzQNF8eg9jznIRCSheKjBy-NLYkve-
ICGa8tQ94XTqTWvGIpCDN4R19rUWnlnGVgKhMnf6ra5h0mxYKyiVl8mVbH5rVzEHGnmC_tqm&c=2
qp8OI_b_ky3yXFryCYkU3XkJehYbiMxoRoM7KwW5ZK0JPs92OvKVQ==&ch=o2igILcTd7vZdRH-
EcEq6-ka5CvKEHvNx7yRl6qNWfAO-PA3NbzvPA==
Everything You Need To Know
Use Great Passwords
Strong (Long, Complex)
Unique
Stay Paranoid & Vigilant
Never Trust Anything or Anyone
Always Double Check
Think Before You Click
Use Routine Backups
Keep Everything Patched / Updated
Think Before You Share
Intro
Avoid The Worstest Things
• Moving Slow on updates
• Thoughtlessness
 Surfing/Clicking/Following/Sharing
• Over Sharing
• Reusing Weak Passwords
• Not Backing Up
• Thinking It Can’t Happen To You
Week One: Intro
Who and How and What
Privacy & Security in general
Why this is all important
5 Basic Things
Week Two: Outrunning The Bear
Passwords
Securing Devices
Browsers & Tor
Email
Staying Safe On-line (General Tips)
Week Three: Outrunning The Bear @ Your Library
Training: Thinking & Behavior
Threat modeling
Hardware and networks
Week Four: Websites & Everything Else
Web Servers and Networks
Backups
Drupal and Wordpress and Joomla
Servers in general
IT Security For Librarians
Blake Carver
LYRASIS Systems Administrator

Mais conteúdo relacionado

Mais procurados

Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspectiveMohammad Ibrahim Fheili
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 

Mais procurados (20)

Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
New internet security
New internet securityNew internet security
New internet security
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Data breach
Data breachData breach
Data breach
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 

Semelhante a An Introduction To IT Security And Privacy for Librarians and Libraries

87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

Semelhante a An Introduction To IT Security And Privacy for Librarians and Libraries (20)

Users guide
Users guideUsers guide
Users guide
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

An Introduction To IT Security And Privacy for Librarians and Libraries

  • 1. IT Security For Librarians Blake Carver LYRASIS Systems Administrator
  • 2. Week One: Intro Who and How and What Privacy & Security in general Why this is all important 5 Basic Things Week Two: Outrunning The Bear Privacy Passwords Securing Devices Web Browsers Email Staying Safe On-line (General Tips) Week Three: Outrunning The Bear @ Your Library Training: Thinking & Behavior Threat modeling Hardware and networks Week Four: Websites & Everything Else! Web Servers and Networks Backups Drupal and Wordpress and Joomla Servers in general
  • 3. Everything You Need To Know • Use Good Passwords • Stay Paranoid & Vigilant • Use Routine Backups • Keep Everything Patched / Updated • Think Before You Share Or Connect Intro
  • 4. Other Things l Install Updates NOW l Passwords are Key l ALL Software Has Flaws l Security Is Complicated l Everyone Plays A Part
  • 5. Common Security Myths • You have nothing worth stealing • Patches and updates make things worse and break them • You can look at a web site and know it's safe • No one will guess this password • Social Media Sites Are Safe • I’m safe! I use Anti-virus / firewall • There’s only malware on Desktops not phones • If I'm compromised I will know it • I'm too smart to get infected Intro
  • 6. Common Security Excuses • But nobody would do that [Exploit Method/Thing] • I can't remember all these passwords. • Firewalls / AV / Security just gets in the way • They won't be able to see that; it's hidden. • It's safe because you have to log in first. Intro
  • 7. So What Are We Talking About ● ● ● ● ● ● ● ● Intro
  • 8. The Way Things Are Vs. The Way Things Oughtta Be
  • 9. But the state argued that because cell phones constantly reveal their locations to carriers by pinging nearby cell towers, Andrews “voluntarily shared this information with third parties,” including the police, merely by keeping his phone on. In other words, if you don't shut off your phone, you're asking to be tracked. “While cell phones are ubiquitous, they all come with 'off' switches,” the state responded in the brief. “Because Andrews chose to keep his cell phone on, he was voluntarily sharing the location of his cell phone with third parties.” “The government has indeed repeatedly argued that there is no [reasonable expectation of privacy] in cell phone location information, in court and out,” Nathan Wessler, a staff attorney with the ACLU's speech, privacy and technology project, told Motherboard in an email. “In cases involving historical cell site location information, the government has danced around this argument, arguing that phone users give up their expectation of privacy in their location information merely by making and receiving calls.” State of MD Vs Kerron Andrews
  • 10.
  • 11. If Vs. When Somethings are IFs, somethings are WHENs Perhaps things are Likely and Possible
  • 12. ● ● ● ● ● ● ● ● Bad Guys? Hackers? Crackers? Criminals? Intro
  • 13.
  • 14.
  • 15.
  • 16. ● ● ● ● ● ● ● ● Security Cyber Security? IT Security? Safety? Information Security? Information Literacy? The Digital Divide? Intro
  • 17. “Security is two different things: It's a feeling & It's a reality ” Bruce Schneier – TedxPSU Intro
  • 19. ● ● ● ● ● ● ● ● Privacy Cyber Privacy? IT Privacy? Online Privacy? Information Literacy? The Digital Divide? Intro
  • 20. What will be the consequences of participation in this data set? https://github.com/frankmcsherry/blog/blob/master/posts/2016-02-06.md
  • 21. Are we helping people avoid being added to more and more datasets? Are we increasing their digital foot prints?
  • 22. Security & Privacy are, Getting Better, But they're Getting Worse FasterIntro
  • 23. Why does this keep happening? The Internet was built for openness and speed More Things Online – More Targets Old, out-of-date systems and budget shortfalls New poorly designed systems Surveillance is the business of the Internet
  • 28. Not much of this crime is new Automation Distance "Technique Propagation" (“Only the first attacker has to be skilled; everyone else can use his software.”) Intro
  • 29. The technology of the internet makes the bad guys vastly more efficient. Intro
  • 30. It's Safe Behind The Keyboard Hacking is a really safe crime. Comparatively. To other real life crime
  • 31. Intro
  • 32. Where Are They Working? • Social Networks • Search Engines • Advertising • Email • Web Sites • Web Servers • Home Computers • Mobile Devices Intro
  • 33. This is the work of a rogue industry, not a roguish teenager Intro
  • 34. *Thanks to Brian Krebs for sharing screenshots: krebsonsecurity.com And to Dr. Mark Vriesenga, BAE systems Examples Intro
  • 35. What Are They After? • PINs • Passwords • Credit Cards • Bank Accounts • Usernames • Contact Lists • Emails • Phone Numbers • Your Hardware... Intro
  • 37. Personal information is the currency of the underground economy Intro
  • 38. Personal information is the currency of the entire Internet economy Intro
  • 39.
  • 40. What's It Worth?Credit Cards: $5-$30 Basic or “Random” $5-$8 With Bank ID# $15 With Date of Birth $15 With Fullzinfo $30 Payment service accounts: $20-$300 containing from US$400 to $1,000 between $20 and $50 containing from $5,000 to $8,000 range from $200 to $300 Bank login credentials: $190-$500 A $2,200 balance account selling for $190. $500 for a $6,000 account balance, to $1,200 for a $20,000 account balance Online premium content services: $.55-$15 Online video streaming($0.25 to $1) premium cable channel streaming services ($7.50) premium comic book services ($0.55) professional sports streaming ($15) Loyalty, community accounts: $20-$1400 A major hotel brand loyalty account with 100,000 points for sale for $20 An online auction community account with high reputation marks priced at $1,400 "The Hidden Data Economy" study by MacAfee October 2015
  • 42. The Era Of Steal Everything Everything has some value Intro
  • 43. Against a sufficiently motivated and equipped adversary, no device is impenetrable. Intro
  • 44. There is no such thing as a secure computer Intro
  • 45. We are making things safER Intro
  • 46. "None of this is about being "unhackable"; it’s about making the difficulty of doing so not worth the effort." Intro
  • 47. Intro
  • 49. Think Different… Have A Hacker Mindset Have A Security Mindset Intro
  • 51. Everything You Need To Know Use Great Passwords Strong (Long, Complex) Unique Stay Paranoid & Vigilant Never Trust Anything or Anyone Always Double Check Intro
  • 53. Everything You Need To Know Use Great Passwords Strong (Long, Complex) Unique Stay Paranoid & Vigilant Never Trust Anything or Anyone Always Double Check Think Before You Click Use Routine Backups Keep Everything Patched / Updated Think Before You Share Intro
  • 54. Avoid The Worstest Things • Moving Slow on updates • Thoughtlessness  Surfing/Clicking/Following/Sharing • Over Sharing • Reusing Weak Passwords • Not Backing Up • Thinking It Can’t Happen To You
  • 55. Week One: Intro Who and How and What Privacy & Security in general Why this is all important 5 Basic Things Week Two: Outrunning The Bear Passwords Securing Devices Browsers & Tor Email Staying Safe On-line (General Tips) Week Three: Outrunning The Bear @ Your Library Training: Thinking & Behavior Threat modeling Hardware and networks Week Four: Websites & Everything Else Web Servers and Networks Backups Drupal and Wordpress and Joomla Servers in general
  • 56. IT Security For Librarians Blake Carver LYRASIS Systems Administrator

Notas do Editor

  1. The following slides outline what I mean here. Things *should* be better.
  2. This news article on Privacy tried to load a REDICULOUS number of trackers.
  3. IF the NSA comes after you, they’ll get you. Ain’t nobody got time for that kind of defense. WHEN a bot finds your open ports / not updated WordPRess site then you’re dead. The NSA isn’t very likely. The bot WILL happen.
  4. I like to use bad guys.
  5. Bad guys or good guys?
  6. Bad guys! The bears we want to out run. Bots and other things that are crawling IP address 24/7
  7. Evidence of bots looking for insecure PHPMyAdmin installs
  8. I like IT Security Let’s make it a part of Information Literacy!
  9. Things aren’t SECURE or NOT It’s not all black and white.
  10. The link is there, a really interesting read as it applies to privacy.
  11. Read that prvious link
  12. Professionals, who are good at what they do, and smart and talented. But then everyone else follows what they do.
  13. Good guys? All these “good guys” are doing their best to track our every move.
  14. Would you rather risk going out and robbing people in real life, or sit behind a keyboard?
  15. Got this from http://www.verizonenterprise.com/DBIR/resources/2013/
  16. http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/
  17. https://www.teachprivacy.com/the-health-data-breach-and-id-theft-epidemic/
  18. An example of being careful. That “Click Here” link had a really scary link in it. Turns out it’s just a constantcontact link, nothing bad, but holy cow it looks scary.