Chapter 4. Applying Best Practices

Nicole Hennig

Abstract


Chapter 4 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”

Chapter 4 discusses the importance of implementing best security practices. It gives some tips for getting started, with a list of which topics in this report are the best starting points. It also discusses ideas for assisting and educating library users about these practices. It concludes with a bibliography for learning more about these topics.


Full Text:

HTML PDF

References


Brian Krebs, “Who Makes the IoT Things under Attack?” Krebs on Security (blog), October 3, 2016, https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack.

Brian Krebs, “Hacked Cameras, DVRs Powered Today’s Massive Internet Outage,” Krebs on Security (blog), October 21, 2016, https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage.

Darrin Pauli, “Ransomware Scum Offer Free Decryption if You Infect Two Mates,” The Register, December 11, 2016, www.theregister.co.uk/2016/12/11/ransomware_offer_pay_us_a_770_ransom_or_infect_two_friends.

“How to Organize a Crypto­Party,” CryptoParty wiki, last modified September 29, 2017, https://www.cryptoparty.in/organize/howto.

See “Playlists,” Electronic Frontier Foundation, Surveillance Self-Defense, accessed January 8, 2018, https://ssd.eff.org/en/playlist.

Nicole Hennig, “Privacy and Security Online Course,” accessed January 8, 2018, http://nicolehennig.com/courses/privacy-security-best-practices-library-users.


Refbacks

  • There are currently no refbacks.


Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy