Chapter 1. Assessing Your Security and Privacy Needs

Nicole Hennig

Abstract


Chapter 1 of Library Technology Reports (vol. 54, no. 3), "Privacy and Security Online: Best Practices for Cybersecurity"

Chapter 1 introduces the topic of privacy and security and discusses where to find the best information—which sources can you trust, and how do you evaluate security software and apps? It also covers how to build your own security and privacy plan, known as a “threat model.”


Full Text:

HTML PDF

References


Allen St. John, “Equifax Data Breach: What Consumers Need to Know,” Consumer Reports, September 21, 2017, https://www.consumerreports.org/privacy/what-consumers-need-to-know-about-the-equifax-data-breach/.

Electronic Frontier Foundation, “Assessing Your Risks,” Surveillance Self-

Defense, last reviewed September 7, 2017, https://ssd.eff.org/en/module/assessing-your-risks.


Refbacks

  • There are currently no refbacks.


Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy