Editing LFI Course Materials/Week 7: Cybersecurity for librarians
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
==== Overview ==== | ==== Overview ==== | ||
− | Hack. Breach. Ransomware. These words appear in the headlines daily, causing much fear and anxiety. This week, librarian-turned-cybersecurity professional Tracy Z. Maleeff will take us through the security side of things, which overlaps with privacy but has some important differences. She’ll help us get an understanding of Information Security vocabulary and best practices for the protection of personal and library data. She’ll cover what resources are available for the purposes of news monitoring, collection development, or training. You will come away from this session empowered with knowledge of how to create some defenses and deal with Information Security matters without fear, uncertainty, or doubt. | + | Hack. Breach. Ransomware. These words appear in the headlines daily, causing much fear and anxiety. This week, librarian-turned-cybersecurity professional Tracy Z. Maleeff, Cyber Analyst at GSK, will take us through the security side of things, which overlaps with privacy but has some important differences. She’ll help us get an understanding of Information Security vocabulary and best practices for the protection of personal and library data. She’ll cover what resources are available for the purposes of news monitoring, collection development, or training. You will come away from this session empowered with knowledge of how to create some defenses and deal with Information Security matters without fear, uncertainty, or doubt. |
==== Learning objectives ==== | ==== Learning objectives ==== | ||
Line 16: | Line 16: | ||
[https://www.forbes.com/sites/forbestechcouncil/2019/03/22/five-tech-trends-driving-cybersecurity-in-2019/ Five Tech Trends Driving Cybersecurity In 2019] | [https://www.forbes.com/sites/forbestechcouncil/2019/03/22/five-tech-trends-driving-cybersecurity-in-2019/ Five Tech Trends Driving Cybersecurity In 2019] | ||
+ | |||
[https://www.forbes.com/sites/quora/2019/04/02/what-are-the-biggest-cybersecurity-threats-in-2019/#3cfae1354b30 What Are The Biggest Cybersecurity Threats In 2019?] | [https://www.forbes.com/sites/quora/2019/04/02/what-are-the-biggest-cybersecurity-threats-in-2019/#3cfae1354b30 What Are The Biggest Cybersecurity Threats In 2019?] | ||
+ | |||
[https://www.thesslstore.com/blog/80-eye-opening-cyber-security-statistics-for-2019/ 80 Eye-Opening Cyber Security Statistics for 2019] | [https://www.thesslstore.com/blog/80-eye-opening-cyber-security-statistics-for-2019/ 80 Eye-Opening Cyber Security Statistics for 2019] | ||
Line 31: | Line 33: | ||
* Lecture, readings, discussion forum, and small group work | * Lecture, readings, discussion forum, and small group work | ||
* Post on the discussion forum about your small group work progress, including links to relevant drafts or outlines | * Post on the discussion forum about your small group work progress, including links to relevant drafts or outlines | ||
− |