Chapter 4. Applying Best Practices
Abstract
Chapter 4 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”
Chapter 4 discusses the importance of implementing best security practices. It gives some tips for getting started, with a list of which topics in this report are the best starting points. It also discusses ideas for assisting and educating library users about these practices. It concludes with a bibliography for learning more about these topics.
References
Brian Krebs, “Who Makes the IoT Things under Attack?” Krebs on Security (blog), October 3, 2016, https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack.
Brian Krebs, “Hacked Cameras, DVRs Powered Today’s Massive Internet Outage,” Krebs on Security (blog), October 21, 2016, https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage.
Darrin Pauli, “Ransomware Scum Offer Free Decryption if You Infect Two Mates,” The Register, December 11, 2016, www.theregister.co.uk/2016/12/11/ransomware_offer_pay_us_a_770_ransom_or_infect_two_friends.
“How to Organize a CryptoParty,” CryptoParty wiki, last modified September 29, 2017, https://www.cryptoparty.in/organize/howto.
See “Playlists,” Electronic Frontier Foundation, Surveillance Self-Defense, accessed January 8, 2018, https://ssd.eff.org/en/playlist.
Nicole Hennig, “Privacy and Security Online Course,” accessed January 8, 2018, http://nicolehennig.com/courses/privacy-security-best-practices-library-users.
Refbacks
- There are currently no refbacks.
Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy