Editing Main Page/Crash Courses/Programs and training/Week 2
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
=== Week 2: Threat modeling and privacy terms=== | === Week 2: Threat modeling and privacy terms=== | ||
− | * Real time lecture: October | + | * Real time lecture: October 11th, 12 - 2 pm Pacific/3 - 5 pm Eastern on Zoom https://zoom.us/j/9129428892 |
− | * Recording: | + | * Recording: |
− | * Slides: | + | * Slides: |
==== Overview ==== | ==== Overview ==== | ||
+ | add library privacy values to this | ||
+ | |||
This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs, their material conditions, and their community network. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in big and small ways. We'll discuss some example threat models, and the ways that different threat models should impact our decision-making when it comes to library privacy. We'll also introduce and discuss basic privacy terminology. | This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs, their material conditions, and their community network. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in big and small ways. We'll discuss some example threat models, and the ways that different threat models should impact our decision-making when it comes to library privacy. We'll also introduce and discuss basic privacy terminology. | ||
Line 13: | Line 15: | ||
==== Discussion board prompt ==== | ==== Discussion board prompt ==== | ||
− | * What threat models do you know exist in your community? Which ones resonate with you the most | + | * What threat models do you know exist in your community? Which ones resonate with you the most? |
− | * Chat | + | * Chat link: |
==== Tasks ==== | ==== Tasks ==== | ||
* Lecture, readings, post to discussion board | * Lecture, readings, post to discussion board |