Editing LFI Course Materials/Week 7: Cybersecurity for librarians
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
=== Week 7: Cybersecurity for librarians === | === Week 7: Cybersecurity for librarians === | ||
− | * Real time lecture: | + | * Real time lecture: June 14th 10 am Pacific/1 pm Eastern |
==== Overview ==== | ==== Overview ==== | ||
− | Hack. Breach. Ransomware. These words appear in the headlines daily, causing much fear and anxiety. This week, librarian-turned-cybersecurity professional Tracy Z. Maleeff will take us through the security side of things, which overlaps with privacy but has some important differences. She’ll help us get an understanding of Information Security vocabulary and best practices for the protection of personal and library data. She’ll cover what resources are available for the purposes of news monitoring, collection development, or training. You will come away from this session empowered with knowledge of how to create some defenses and deal with Information Security matters without fear, uncertainty, or doubt. | + | Hack. Breach. Ransomware. These words appear in the news headlines daily, causing much fear and anxiety. This week, librarian-turned-cybersecurity professional Tracy Z. Maleeff, Cyber Analyst at GSK, will take us through the security side of things, which overlaps with privacy but has some important differences. She’ll help us get an understanding of Information Security vocabulary and best practices for the protection of personal and library data. She’ll cover what resources are available for the purposes of news monitoring, collection development, or training. You will come away from this session empowered with knowledge of how to create some defenses and deal with Information Security matters without fear, uncertainty, or doubt. |
==== Learning objectives ==== | ==== Learning objectives ==== | ||
Line 10: | Line 10: | ||
* Learn basic industry vocabulary to help comprehend industry news or create alerts | * Learn basic industry vocabulary to help comprehend industry news or create alerts | ||
* Get a list of recommended infosec resources | * Get a list of recommended infosec resources | ||
− | * Take a deeper dive into passwords, social engineering, physical security, and end user security awareness/training | + | * Take a deeper dive into passwords, social engineering, physical security, and end user |
+ | security awareness/training | ||
==== Readings ==== | ==== Readings ==== | ||
− | + | What You Need To Know About Cybersecurity In 2018 | |
− | + | (Published: 30 March 2018 | Source: Forbes) | |
− | + | https://www.forbes.com/sites/laurencebradford/2018/03/30/why-people-should-learn-about-cybe | |
− | + | rsecurity-in-2018/#62adf9e75d00 | |
− | + | Taking the pulse of your information security culture | |
− | + | (Published: 29 March 2018 | Source: CSO) | |
+ | https://www.csoonline.com/article/3048321/security/taking-the-pulse-of-your-information-security | ||
+ | -culture.html | ||
==== Guest lecturer ==== | ==== Guest lecturer ==== | ||
− | Tracy Z. Maleeff, | + | Tracy Z. Maleeff, Cyber Analyst at GSK |
==== Discussion ==== | ==== Discussion ==== | ||
Line 31: | Line 34: | ||
* Lecture, readings, discussion forum, and small group work | * Lecture, readings, discussion forum, and small group work | ||
* Post on the discussion forum about your small group work progress, including links to relevant drafts or outlines | * Post on the discussion forum about your small group work progress, including links to relevant drafts or outlines | ||
− |