Chapter 2. Security

Nicole Hennig

Abstract


Chapter 2 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”

Chapter 2 discusses many aspects of security, including

•   backups, both local and cloud

•   lost or stolen devices

•   phishing attacks, malware, and ransomware

•   how to protect your data on public Wi-Fi by using a VPN

•   managing your passwords and using two-factor authentication

•   mobile payments in retails stores with Apple Pay or Android Pay

•   biometric security, using the examples of Apple’s Touch ID and Face ID

•   data breaches and identity theft

For each of these topics, best practices are offered for protecting yourself and your data.

Full Text:

HTML PDF

References


Backblaze charges five dollars per month or fifty dollars per year, for example (Backblaze “Buy” page, accessed January 3, 2018, https://secure.backblaze.com/buy.htm).

Joe Kissell, “The Best Online Cloud Backup Service,” last updated October 3, 2017, Wirecutter, now owned by the New York Times, https://thewirecutter.com/reviews/best-online-backup-service/#our-pick-backblaze.

Justin Krajeski and Kimber Streams, “The Best Portable Hard Drive,” Wirecutter, last updated October 24, 2017, https://thewirecutter.com/reviews/best-portable-hard-drive.

“How to Back Up Your iPhone and iPad,” by Brad Ward, January 4, 2017, on TechRadar, www.techradar.com/how-to/software/how-to-backup-iphone-ipad-1299014, for some useful instructions.

“iMazing 2.2 Review: A Better Way to Use Your Mac to Manage Your iPhone and iPad,” by J. R. Bookwalter, in Macworld, May 16, 2017, https://www.macworld.com/article/3196571/software/imazing-2-2-review-a-better-way-to-use-your-mac-to-manage-your-iphone-and-ipad.html.

“Best Android Backup Apps,” by John Corpuz, on Tom’s Guide, June 27, 2017, https://www.tomsguide.com/us/pictures-story/633-best-android-backup-apps.html.

“iCloud Photo Library: The Best Cloud Photo Management Solution,” by Bradley Chambers, on The Sweet Setup, October 16, 2017, https://thesweetsetup.com/apps/best-photo-management-solution.

Sally Wiener Grotta, “Google Photos Review: The Best Photo/Video Backup App,” Tom’s Guide, May 24, 2017, https://www.tomsguide.com/us/google-photos-ios-android,review-4395.html.

Ed Rhee and Alina Bradford, “Find Your Lost Android Device with Google’s Find My Device,” CNET, May 17, 2017, https://www.cnet.com/how-to/find-your-lost-android-device-with-android-device-manager.

Danny Palmer, “New Trojan Malware Campaign Sends Users to Fake Banking Site That Looks Just Like the Real Thing,” ZDNet, August 14, 2017, www.zdnet.com/article/new-trojan-sends-users-to-fake-banking-site-that-looks-just-like-the-real-thing.

Danny Palmer, “1.4 Million Phishing Websites Are Created Every Month: Here’s Who the Scammers Are Pretending to Be,” ZDNet, September 22, 2017, www.zdnet.com/article/1-4-million-phishing-websites-are-created-every-month-heres-who-the-scammers-are-pretending-to-be.

Danny Palmer, “What Is Phishing? Everything You Need to Know to Protect Yourself from Scam Emails and More,” ZDNet, September 6, 2017, www.zdnet.com/article/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more.

MacEwan University, “University Discovers Online Fraud: IT Systems Not Compromised by Incident,” MacEwan News, August 31, 2017, https://www.macewan.ca/wcm/MacEwanNews/PHISHING_ATTACK.

Webroot, Quarterly Threat Trends: Phishing Attacks Growing in Scale and Sophistication, September 2017, 12, https://www.webroot.com/us/en/business/resources/threat-trends/sept-2017.

Julie Foote, “Beware—New Kind of Virus Embedded in a Word or Excel Document,” MVTV Wireless, January 12, 2016, https://www.mvtvwireless.com/beware-new-kind-of-virus-embedded-in-a-word-or-excel-document.

Phia Bennin, “What Kind of Idiot Gets Phished?” episode 97 of Reply All, Gimlet Media, May 18, 2017, https://gimletmedia.com/episode/97-what-kind-of-idiot-gets-phished.

Danny Palmer, “What Is Phishing? Everything You Need to Know to Protect Yourself from Scam Emails and More,” ZDNet, September 6, 2017, www.zdnet.com/article/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more.

“How to: Avoid Phishing Attacks,” Electronic Frontier Foundation, Surveillance Self-Defense, last reviewed September 6, 2017, https://ssd.eff.org/en/module/how-avoid-phishing-attacks.

Andrew Tarantola, “‘WannaCry’ Ransomware Attack Spreads Worldwide,” Engadget, May 12, 2017, updated May 13, 2017, https://www.engadget.com/2017/05/12/12-countries-hit-in-massive-cyber-heist.

Kim Zetter, “4 Ways to Protect against the Very Real Threat of Ransomware,” Wired, May 13, 2016, https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target.

Gary Sims, “How Easy Is It to Capture Data on Public Free Wi-Fi—Gary Explains,” Android Authority, November 14, 2016, https://www.androidauthority.com/capture-data-open-wi-fi-726356.

Brad Smith, “Express VPN Review,” TheBestVPN, last updated September 16, 2017, https://thebestvpn.com/reviews/expressvpn.

Jon Brodkin, “How ISPs Can Sell Your Web History—and How to Stop Them,” Ars Technica, March 24, 2017, https://arstechnica.com/information-technology/2017/03/how-isps-can-sell-your-web-history-and-how-to-stop-them.

“Choosing the VPN That’s Right for You,” from the Electronic Frontier Foundation, Surveillance Self-Defense, last reviewed June 9, 2016, https://ssd.eff.org/en/module/choosing-vpn-thats-right-you.

Bruce Schneier, “Choosing Secure Passwords,” Schneier on Security (blog), March 3, 2014, https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html.

Electronic Frontier Foundation, “Want a Security Starter Pack?” under 5. Creating Strong Passwords, Surveillance Self-Defense, last reviewed October 16, 2017, https://ssd.eff.org/en/playlist/want-security-starter-pack.

Robert McGinley Myers, “1Password: The Best Password App and Manager (and Why You Need One),” The Sweet Setup, August 8, 2017, https://thesweetsetup.com/apps/best-password-manager-and-why-you-need-one.

Joe Kissel, “The Best Password Managers,” Wirecutter, August 3, 2017, last updated December 8, 2017, https://thewirecutter.com/reviews/best-password-managers.

Bruce Schneier, “Stop Trying to Fix the User,” IEEE Security and Privacy 14, no. 5 (September–October 2016): 96, http://ieeexplore.ieee.org/document/7676198 (requires login).

Two Factor Auth (2FA), accessed January 4, 2018, https://twofactorauth.org.

Google Account Help page “Sign In Using Backup Codes,” accessed January 4, 2018, https://support.google.com/accounts/answer/1187538?hl=en.

Lisa Vaas, “DeRay Mckesson’s Twitter Account Hacked with Just His Name and Four Digits,” Naked Security, June 14, 2016, https://nakedsecurity.sophos.com/2016/06/14/deray-mckessons-twitter-account-hacked-with-just-his-name-and-four-digits.

“The Security of ‘Traditional’ Payments vs. Alternatives: Mobile Wallets,” Bluefin, May 12, 2016, https://www.bluefin.com/bluefin-news/security-traditional-payment-methods-vs-alternatives-spotlight-mobile-wallets.

“Apple Pay Security and Privacy Overview,” Apple support pages, September 21, 2017, https://support.apple.com/en-us/HT203027.

“Use Touch ID on iPhone and iPad,” Apple Support pages, November 7, 2017, https://support.apple.com/en-us/HT201371.

“About Face ID Advanced Technology,” Apple Support pages, December 20, 2017, https://support.apple.com/en-us/HT208108.

Paul Cucu, “Biometric Authentication Overview, Advantages and Disadvantages,” Heimdal Security, last updated July 28, 2017, https://heimdalsecurity.com/blog/biometric-authentication.

“Will Apple’s FaceID Affect Your Rights?” by Brett Max Kaufman, Staff Attorney, ACLU Center for Democracy, September 22, 2017, https://www.aclu.org/blog/privacy-technology/surveillance-technologies/will-apples-faceid-affect-your-rights.

Andy Greenberg, “Hackers Say They’ve Broken Face ID a Week after iPhone X Release,” Wired, November 12, 2017, https://www.wired.com/story/hackers-say-broke-face-id-security.

Bruce Schneier, “Apple FaceID Hacked,” Schneier on Security [blog], November 15, 2017, https://www.schneier.com/blog/archives/2017/11/apple_faceid_ha.html.

Paul Cucu, “Biometric Authentication Overview, Advantages and Disadvantages,” Heimdal Security’s blog, last updated July 28, 2017, https://heimdalsecurity.com/blog/biometric-authentication.

“Face Recognition,” EFF, Street-Level Surveillance, accessed January 4, 2018, https://www.eff.org/pages/face-recognition.

Olga Kharif, “2016 Was a Record Year for Data Breaches,” Bloomberg Technology, January 19, 2017, https://www.bloomberg.com/news/articles/2017-01-19/data-breaches-hit-record-in-2016-as-dnc-wendy-s-co-hacked.

“2017 Data Breaches,” Identity Theft Resource Center, accessed December 12, 2017, www.idtheftcenter.org/Data-Breaches/data-breaches.

Robert Hackett, “LinkedIn Lost 167 Million Account Credentials in Data Breach,” Fortune, May 18, 2016, http://fortune.com/2016/05/18/linkedin-data-breach-email-password.

Selena Larson, “Every Single Yahoo Account Was Hacked—3 Billion in All,” CNN Tech, October 4, 2017, http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html.

Seena Gressin, “The Equifax Data Breach: What to Do,” FTC Consumer Information, September 8, 2017, https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do.

Troy Hunt, “Who, What & Why,” Have I Been Pwned? accessed January 4, 2018, https://haveibeenpwned.com/About.

“Data Breaches,” The Privacy Rights Clearinghouse, accessed January 4, 2018, https://www.privacyrights.org/data-breaches.

“What to Do When You Receive a Data Breach Notice,” The Privacy Rights Clearinghouse, February 1, 2006, revised November 2, 2017, https://www.privacyrights.org/consumer-guides/what-do-when-you-receive-data-breach-notice.

Bob Sullivan, “Just How Common Is ID Theft?” NBC News, last updated June 20, 2005, www.nbcnews.com/id/8409283/ns/technology_and_science-security/t/just-how-common-id-theft.

US Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, “Victims of Identity Theft, 2014,” NCJ 248991 (September 2015, revised November 13, 2017): 5, https://www.bjs.gov/content/pub/pdf/vit14.pdf.

Herb Weisbaum, “Identity Fraud Hits Record Number of Americans in 2016,” NBC News, February 2, 2017, https://www.nbcnews.com/business/consumer/identity-fraud-hits-record-number-americans-2016-n715756.

“Identity Fraud Hits Record High with 15.4 Million U.S. Victims in 2016, Up 16 Percent According to New Javelin Strategy & Research Study,” news release, Javelin, February 1, 2017, https://www.javelinstrategy.com/press-release/identity-fraud-hits-record-high-154-million-us-victims-2016-16-percent-according-new.

LifeLock homepage, accessed January 4, 2018, https://www.lifelock.com.

“Am I Responsible for Unauthorized Charges if My Credit Cards Are Lost or Stolen?” Consumer Financial Protection Bureau, July 11, 2017, https://www.consumerfinance.gov/ask-cfpb/am-i-responsible-for-unauthorized-charges-if-my-credit-cards-are-lost-or-stolen-en-29.

“Don’t Get Taken Guarding Your ID: Do-It-Yourself Safeguards Are Just as Effective as Paid Services,” Consumer Reports, January 2013, updated September 8, 2014, https://www.consumerreports.org/cro/magazine/2013/01/don-t-get-taken-guarding-your-id/index.htm.

Katherine Ross, “How Much It Costs in Every State to Freeze Your Credit Report,” ValuePenguin, September 2017, https://www.valuepenguin.com/states-where-freezing-your-credit-will-cost-you-most.


Refbacks

  • There are currently no refbacks.


Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy