Chapter 2. Security
Abstract
Chapter 2 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”
Chapter 2 discusses many aspects of security, including
• backups, both local and cloud
• lost or stolen devices
• phishing attacks, malware, and ransomware
• how to protect your data on public Wi-Fi by using a VPN
• managing your passwords and using two-factor authentication
• mobile payments in retails stores with Apple Pay or Android Pay
• biometric security, using the examples of Apple’s Touch ID and Face ID
• data breaches and identity theft
For each of these topics, best practices are offered for protecting yourself and your data.References
Backblaze charges five dollars per month or fifty dollars per year, for example (Backblaze “Buy” page, accessed January 3, 2018, https://secure.backblaze.com/buy.htm).
Joe Kissell, “The Best Online Cloud Backup Service,” last updated October 3, 2017, Wirecutter, now owned by the New York Times, https://thewirecutter.com/reviews/best-online-backup-service/#our-pick-backblaze.
Justin Krajeski and Kimber Streams, “The Best Portable Hard Drive,” Wirecutter, last updated October 24, 2017, https://thewirecutter.com/reviews/best-portable-hard-drive.
“How to Back Up Your iPhone and iPad,” by Brad Ward, January 4, 2017, on TechRadar, www.techradar.com/how-to/software/how-to-backup-iphone-ipad-1299014, for some useful instructions.
“iMazing 2.2 Review: A Better Way to Use Your Mac to Manage Your iPhone and iPad,” by J. R. Bookwalter, in Macworld, May 16, 2017, https://www.macworld.com/article/3196571/software/imazing-2-2-review-a-better-way-to-use-your-mac-to-manage-your-iphone-and-ipad.html.
“Best Android Backup Apps,” by John Corpuz, on Tom’s Guide, June 27, 2017, https://www.tomsguide.com/us/pictures-story/633-best-android-backup-apps.html.
“iCloud Photo Library: The Best Cloud Photo Management Solution,” by Bradley Chambers, on The Sweet Setup, October 16, 2017, https://thesweetsetup.com/apps/best-photo-management-solution.
Sally Wiener Grotta, “Google Photos Review: The Best Photo/Video Backup App,” Tom’s Guide, May 24, 2017, https://www.tomsguide.com/us/google-photos-ios-android,review-4395.html.
Ed Rhee and Alina Bradford, “Find Your Lost Android Device with Google’s Find My Device,” CNET, May 17, 2017, https://www.cnet.com/how-to/find-your-lost-android-device-with-android-device-manager.
Danny Palmer, “New Trojan Malware Campaign Sends Users to Fake Banking Site That Looks Just Like the Real Thing,” ZDNet, August 14, 2017, www.zdnet.com/article/new-trojan-sends-users-to-fake-banking-site-that-looks-just-like-the-real-thing.
Danny Palmer, “1.4 Million Phishing Websites Are Created Every Month: Here’s Who the Scammers Are Pretending to Be,” ZDNet, September 22, 2017, www.zdnet.com/article/1-4-million-phishing-websites-are-created-every-month-heres-who-the-scammers-are-pretending-to-be.
Danny Palmer, “What Is Phishing? Everything You Need to Know to Protect Yourself from Scam Emails and More,” ZDNet, September 6, 2017, www.zdnet.com/article/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more.
MacEwan University, “University Discovers Online Fraud: IT Systems Not Compromised by Incident,” MacEwan News, August 31, 2017, https://www.macewan.ca/wcm/MacEwanNews/PHISHING_ATTACK.
Webroot, Quarterly Threat Trends: Phishing Attacks Growing in Scale and Sophistication, September 2017, 12, https://www.webroot.com/us/en/business/resources/threat-trends/sept-2017.
Julie Foote, “Beware—New Kind of Virus Embedded in a Word or Excel Document,” MVTV Wireless, January 12, 2016, https://www.mvtvwireless.com/beware-new-kind-of-virus-embedded-in-a-word-or-excel-document.
Phia Bennin, “What Kind of Idiot Gets Phished?” episode 97 of Reply All, Gimlet Media, May 18, 2017, https://gimletmedia.com/episode/97-what-kind-of-idiot-gets-phished.
Danny Palmer, “What Is Phishing? Everything You Need to Know to Protect Yourself from Scam Emails and More,” ZDNet, September 6, 2017, www.zdnet.com/article/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more.
“How to: Avoid Phishing Attacks,” Electronic Frontier Foundation, Surveillance Self-Defense, last reviewed September 6, 2017, https://ssd.eff.org/en/module/how-avoid-phishing-attacks.
Andrew Tarantola, “‘WannaCry’ Ransomware Attack Spreads Worldwide,” Engadget, May 12, 2017, updated May 13, 2017, https://www.engadget.com/2017/05/12/12-countries-hit-in-massive-cyber-heist.
Kim Zetter, “4 Ways to Protect against the Very Real Threat of Ransomware,” Wired, May 13, 2016, https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target.
Gary Sims, “How Easy Is It to Capture Data on Public Free Wi-Fi—Gary Explains,” Android Authority, November 14, 2016, https://www.androidauthority.com/capture-data-open-wi-fi-726356.
Brad Smith, “Express VPN Review,” TheBestVPN, last updated September 16, 2017, https://thebestvpn.com/reviews/expressvpn.
Jon Brodkin, “How ISPs Can Sell Your Web History—and How to Stop Them,” Ars Technica, March 24, 2017, https://arstechnica.com/information-technology/2017/03/how-isps-can-sell-your-web-history-and-how-to-stop-them.
“Choosing the VPN That’s Right for You,” from the Electronic Frontier Foundation, Surveillance Self-Defense, last reviewed June 9, 2016, https://ssd.eff.org/en/module/choosing-vpn-thats-right-you.
Bruce Schneier, “Choosing Secure Passwords,” Schneier on Security (blog), March 3, 2014, https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html.
Electronic Frontier Foundation, “Want a Security Starter Pack?” under 5. Creating Strong Passwords, Surveillance Self-Defense, last reviewed October 16, 2017, https://ssd.eff.org/en/playlist/want-security-starter-pack.
Robert McGinley Myers, “1Password: The Best Password App and Manager (and Why You Need One),” The Sweet Setup, August 8, 2017, https://thesweetsetup.com/apps/best-password-manager-and-why-you-need-one.
Joe Kissel, “The Best Password Managers,” Wirecutter, August 3, 2017, last updated December 8, 2017, https://thewirecutter.com/reviews/best-password-managers.
Bruce Schneier, “Stop Trying to Fix the User,” IEEE Security and Privacy 14, no. 5 (September–October 2016): 96, http://ieeexplore.ieee.org/document/7676198 (requires login).
Two Factor Auth (2FA), accessed January 4, 2018, https://twofactorauth.org.
Google Account Help page “Sign In Using Backup Codes,” accessed January 4, 2018, https://support.google.com/accounts/answer/1187538?hl=en.
Lisa Vaas, “DeRay Mckesson’s Twitter Account Hacked with Just His Name and Four Digits,” Naked Security, June 14, 2016, https://nakedsecurity.sophos.com/2016/06/14/deray-mckessons-twitter-account-hacked-with-just-his-name-and-four-digits.
“The Security of ‘Traditional’ Payments vs. Alternatives: Mobile Wallets,” Bluefin, May 12, 2016, https://www.bluefin.com/bluefin-news/security-traditional-payment-methods-vs-alternatives-spotlight-mobile-wallets.
“Apple Pay Security and Privacy Overview,” Apple support pages, September 21, 2017, https://support.apple.com/en-us/HT203027.
“Use Touch ID on iPhone and iPad,” Apple Support pages, November 7, 2017, https://support.apple.com/en-us/HT201371.
“About Face ID Advanced Technology,” Apple Support pages, December 20, 2017, https://support.apple.com/en-us/HT208108.
Paul Cucu, “Biometric Authentication Overview, Advantages and Disadvantages,” Heimdal Security, last updated July 28, 2017, https://heimdalsecurity.com/blog/biometric-authentication.
“Will Apple’s FaceID Affect Your Rights?” by Brett Max Kaufman, Staff Attorney, ACLU Center for Democracy, September 22, 2017, https://www.aclu.org/blog/privacy-technology/surveillance-technologies/will-apples-faceid-affect-your-rights.
Andy Greenberg, “Hackers Say They’ve Broken Face ID a Week after iPhone X Release,” Wired, November 12, 2017, https://www.wired.com/story/hackers-say-broke-face-id-security.
Bruce Schneier, “Apple FaceID Hacked,” Schneier on Security [blog], November 15, 2017, https://www.schneier.com/blog/archives/2017/11/apple_faceid_ha.html.
Paul Cucu, “Biometric Authentication Overview, Advantages and Disadvantages,” Heimdal Security’s blog, last updated July 28, 2017, https://heimdalsecurity.com/blog/biometric-authentication.
“Face Recognition,” EFF, Street-Level Surveillance, accessed January 4, 2018, https://www.eff.org/pages/face-recognition.
Olga Kharif, “2016 Was a Record Year for Data Breaches,” Bloomberg Technology, January 19, 2017, https://www.bloomberg.com/news/articles/2017-01-19/data-breaches-hit-record-in-2016-as-dnc-wendy-s-co-hacked.
“2017 Data Breaches,” Identity Theft Resource Center, accessed December 12, 2017, www.idtheftcenter.org/Data-Breaches/data-breaches.
Robert Hackett, “LinkedIn Lost 167 Million Account Credentials in Data Breach,” Fortune, May 18, 2016, http://fortune.com/2016/05/18/linkedin-data-breach-email-password.
Selena Larson, “Every Single Yahoo Account Was Hacked—3 Billion in All,” CNN Tech, October 4, 2017, http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html.
Seena Gressin, “The Equifax Data Breach: What to Do,” FTC Consumer Information, September 8, 2017, https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do.
Troy Hunt, “Who, What & Why,” Have I Been Pwned? accessed January 4, 2018, https://haveibeenpwned.com/About.
“Data Breaches,” The Privacy Rights Clearinghouse, accessed January 4, 2018, https://www.privacyrights.org/data-breaches.
“What to Do When You Receive a Data Breach Notice,” The Privacy Rights Clearinghouse, February 1, 2006, revised November 2, 2017, https://www.privacyrights.org/consumer-guides/what-do-when-you-receive-data-breach-notice.
Bob Sullivan, “Just How Common Is ID Theft?” NBC News, last updated June 20, 2005, www.nbcnews.com/id/8409283/ns/technology_and_science-security/t/just-how-common-id-theft.
US Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, “Victims of Identity Theft, 2014,” NCJ 248991 (September 2015, revised November 13, 2017): 5, https://www.bjs.gov/content/pub/pdf/vit14.pdf.
Herb Weisbaum, “Identity Fraud Hits Record Number of Americans in 2016,” NBC News, February 2, 2017, https://www.nbcnews.com/business/consumer/identity-fraud-hits-record-number-americans-2016-n715756.
“Identity Fraud Hits Record High with 15.4 Million U.S. Victims in 2016, Up 16 Percent According to New Javelin Strategy & Research Study,” news release, Javelin, February 1, 2017, https://www.javelinstrategy.com/press-release/identity-fraud-hits-record-high-154-million-us-victims-2016-16-percent-according-new.
LifeLock homepage, accessed January 4, 2018, https://www.lifelock.com.
“Am I Responsible for Unauthorized Charges if My Credit Cards Are Lost or Stolen?” Consumer Financial Protection Bureau, July 11, 2017, https://www.consumerfinance.gov/ask-cfpb/am-i-responsible-for-unauthorized-charges-if-my-credit-cards-are-lost-or-stolen-en-29.
“Don’t Get Taken Guarding Your ID: Do-It-Yourself Safeguards Are Just as Effective as Paid Services,” Consumer Reports, January 2013, updated September 8, 2014, https://www.consumerreports.org/cro/magazine/2013/01/don-t-get-taken-guarding-your-id/index.htm.
Katherine Ross, “How Much It Costs in Every State to Freeze Your Credit Report,” ValuePenguin, September 2017, https://www.valuepenguin.com/states-where-freezing-your-credit-will-cost-you-most.
Refbacks
- There are currently no refbacks.
Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy