Difference between revisions of "LFI 2024/Month 3"
Tesskwilson (talk | contribs) (→Month 3: TOPIC) |
|||
Line 1: | Line 1: | ||
− | === Month 3: | + | === Month 3: Privacy in the Library 2 === |
− | * Real time lecture: | + | * Real time lecture: Friday July 19 at 2:00-4:00 Eastern / 11:00-1:00 Pacific on Zoom |
==== Overview ==== | ==== Overview ==== | ||
− | + | This month, we'll dig deeper into privacy best practices and explore how we talk about privacy in an accessible and personal way. We will talk about gaps in technical literacies and how we as library workers can bridge those gaps with patron and staff trainings, policy reviews and audits, and more. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==== Readings ==== | ==== Readings ==== | ||
+ | No readings for this month. Instead, answer the discussion questions in Discord. | ||
==== Guest lecturer ==== | ==== Guest lecturer ==== | ||
Line 35: | Line 15: | ||
==== Discussion ==== | ==== Discussion ==== | ||
+ | Threat modeling framework: | ||
+ | 1. Assets: What do you want to protect? | ||
+ | 2. Adversaries: Who might want your assets? | ||
+ | 3. Capabilities: What can your adversary do? | ||
+ | 4. Consequences: What could happen if your adversary succeeds? What is the likelihood of this happening? | ||
+ | |||
+ | What resonated about the threat modeling framework? How can you picture using this in a library environment? Are there threat models/personas that feel particularly relevant to your work? | ||
==== Tasks ==== | ==== Tasks ==== |
Revision as of 12:16, 25 June 2024
Contents
Month 3: Privacy in the Library 2
- Real time lecture: Friday July 19 at 2:00-4:00 Eastern / 11:00-1:00 Pacific on Zoom
Overview
This month, we'll dig deeper into privacy best practices and explore how we talk about privacy in an accessible and personal way. We will talk about gaps in technical literacies and how we as library workers can bridge those gaps with patron and staff trainings, policy reviews and audits, and more.
Readings
No readings for this month. Instead, answer the discussion questions in Discord.
Guest lecturer
Discussion
Threat modeling framework: 1. Assets: What do you want to protect? 2. Adversaries: Who might want your assets? 3. Capabilities: What can your adversary do? 4. Consequences: What could happen if your adversary succeeds? What is the likelihood of this happening?
What resonated about the threat modeling framework? How can you picture using this in a library environment? Are there threat models/personas that feel particularly relevant to your work?