digital security + privacy in the librar y · password protection privacy tools topics today....

44
DIGITAL SECURITY + PRIVACY in the library Presenter: Samantha Link

Upload: others

Post on 02-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

DIGITALSECURITY +PRIVACYin the libraryPresenter: Samantha Link

Page 2: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

● SECURITY THREATS- Who wants personal data?- How does data move on the Internet?- Where and how is data vulnerable?

● PASSWORD PROTECTION

● PRIVACY TOOLS

Topics Today

Page 3: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

SECURITYTHREATS

Page 4: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

INDIVIDUALS

COMPANIES GOVERNMENTWho wants

personal data?

advertising investigations

fraud

Page 5: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

INDIVIDUALS

COMPANIES GOVERNMENT

advertising investigations

fraud

Who wants personal

data?

Page 6: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“THE INTERNET”

inside library, office, café,

etc.

CenturyLink, Mediacom, Spectrum, etc.

IMAGE CREDIT: Lazaro Gamio, Washington Post

How does data move through the Internet?

Page 7: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“THE INTERNET”

inside library, office, café,

etc.

accesspoint

How is data vulnerable?

IMAGE CREDIT: Lazaro Gamio, Washington Post

CenturyLink, Mediacom, Spectrum, etc.

Page 8: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

warWardriving

McAfee Blog: "What is Wardriving?"“While it may sound odd to worry about bad guys snatching our personal information from what seems to be thin air, it’s more common than we’d liketo believe. In fact, there are hackers who drive around searching for unsecured wireless connections (networks) using a wireless laptop and portable global positioning system (GPS) with the sole purpose of stealing your information”

Page 9: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

warWardriving

WiFi security = password-protected

connection

Page 10: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

war

We want open WiFi! Consider practical threats. We can educate patrons about security practices, strong passwords, etc.

Remember: “wired” connections (e.g. patron PCs) are quite secure; having a program to clear data upon each log-out even more so. In your library?

What’s a library to do?

Page 11: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“THE INTERNET”

accesspoint

activity

How is data vulnerable?

IMAGE CREDIT: Lazaro Gamio, Washington Post

Page 12: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Account name

Password

Social Security #

war"E-vesdropping"

ServerSender

Page 13: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

IMAGE CREDIT: Wikimedia Commons

Hyper-TextTransfer Protocol Secure

Encryption over the Web

Page 14: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

...11039225900287…

...65342003154354…

...92135892439243…

war

?

Encryption over the Web

ServerSender

Page 15: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

war

Use links to HTTPS websites whenever possible

Keep all software updated!

What’s a library to do?

Page 16: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

E-mail encryption

E-mail uses dedicated "protocol" requiring different encryption; also limited by correspondents’ platform

Options:● Settings within popular services (Gmail, Outlook, Yahoo)● Dedicated service (ProtonMail, Hushmail)

Page 17: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“THE INTERNET”

humanbehavior

How is data vulnerable?

IMAGE CREDIT: Lazaro Gamio, Washington Post

Page 18: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Phishing

Merriam-Webster.com: “a scam by which an Internet user is duped (as by a deceptive e-mail message) into revealing personal or confidential information which the scammer can use illicitly”

Page 20: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Do you recognize sender’s email address?

Look at link URLs before clicking — https://www.website-you-want.com?

Suspicious? Don’t click, contact IT!

Don’t take the bait!

Page 21: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising
Page 22: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“THE INTERNET”

hacking

How is data vulnerable?

IMAGE CREDIT: Lazaro Gamio, Washington Post

Page 23: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Data breaches

2017Equifax credit agency

2019Capital One

Page 24: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Data breaches

Stay informed withFederal Trade Commission

Consumer Information blog:

https://www.consumer.ftc.gov/blog

Page 25: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

PASSWORDPROTECTION

Page 26: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

GOAL: strong passwords

Page 27: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

GOAL: strong passwords

Page 28: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

GOAL: strong passwords

● 12-15 characters● No dictionary words● No obvious details (name, phone #, etc.)● Different for each account● Change if any suspicion!

Current guidelines to avoid beingeasily guessed by humans or robots…

Page 29: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

GOAL: strong passwords

Turn a memorable phrase into secure password...

Example:“Be happy for this moment; this moment is your life”

Bh4tm;tmiyl5433 (15 characters)

Page 30: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

GOAL: password security

Not in plain sight! (no sticky notes on monitors)

Best practice: stored only in staff brains, with knowledge of how to reset them

Page 31: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

GOAL: patron protection

From ALA’s Privacy Tool Kit:

“Confidentiality of library records is a core value of librarianship...For libraries to flourish as centers for uninhibited access to information, librarians must stand behind their users’ right to privacy and freedom of inquiry.”

Page 32: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

PRIVACYTOOLS

Page 33: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

INDIVIDUALS

COMPANIES GOVERNMENT

advertising

Who wants personal data?

Page 34: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

https://www.acxiom.com/what-we-do/data-packages

Page 35: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Aug. 2012

Page 36: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

July 2019

Page 37: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Slate: Facebook, Inc. expects 2019 earnings of $69 billion https://slate.com/technology/2019/10/facebooks-2019-fines-and-settlements.html

July 2019

Page 38: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

2019 documentary investigating U.K. digital marketing firm Cambridge Analyticaand targeted social media advertising campaigns in political elections worldwide

Directed by Karim Amer and Jehane Noujaim

Page 39: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“Filter bubble”

Merriam-Webster.com: “an online environment in which people are exposed only to opinions and information that conform to their existing beliefs”

Fun experiment: Try same keywords in different search engines on various computers

Page 40: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“Anonymize” your ads

Facebook: https://www.facebook.com/ads/preferences

Google: https://support.google.com/ads/answer/2662922

Page 41: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

DuckDuckGo

Free “privacy-dedicated search engine that does not collect or share personal information” such as search terms, location, etc.

https://duckduckgo.com

Page 42: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

“Private” browsing modes

Chrome privacy settings

Firefox privacy settings

Internet Explorer settings

Safari privacy settings

Incognito window

Private window

InPrivate window

Private window

Page 43: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

Browser add-ons

Ghostery“control over ads and tracking technologies”

Privacy Badger“block invisible trackers”

Page 44: DIGITAL SECURITY + PRIVACY in the librar y · PASSWORD PROTECTION PRIVACY TOOLS Topics Today. SECURITY THREATS. INDIVIDUALS COMPANIES GOVERNMENT Who wants personal data? advertising

More privacy tools and info

Electronic Frontier Foundation: https://www.eff.org

Library Freedom Project: https://www.libraryfreedom.org