Data Breach: Key to Prevention and Intrusion Detection the Risk of a Library

Authors

  • Indranil Sarkar Librarian, Baluchar Primary Teachers’ Training Institute, Murshidabad, West Bengal, India

DOI:

https://doi.org/10.51983/ijiss.2018.8.2.535

Keywords:

Security Breach, Dark Web, ITRC, VPN, PLA, Ransomware, Phishing

Abstract

The problem of protecting information and data flows has existed from the very first day of information exchange however advanced Information Communication Technology and information management systems become more and more powerful and distributed. In this article the author aver that the strategy need to implement measures to protect library from the rise of leak confidential information, both accidentally and maliciously, at tremendous cost in money, privacy, national security, and reputation.

References

Lyttle, M. A., & Walsh, S. D. (2015, March 20). Protecting your library against data breach. Retrieved May 23, 2018, from http://publiclibrariesonline.org/2015/03/protecting-your-library-against-a-data-breach/

[Author not specified]. (2017, October). Library patrons in 10 western Wisconsin counties affected in data breach. Retrieved May 26, 2018, from http://www.week.com/story/36583282/2017/10/Thursday/alert-library-patrons-in-10-western-wisconsin-counties-affected-in-data-breach

Armerding, T. (2018, January 26). The 17 biggest data breaches of the 21st century. Security practitioners weigh in on the 17 worst data breaches in recent memory. Retrieved May 24, 2018, from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html

Gemalto. (2017). The year of internal threats and accidental data breaches. Retrieved May 27, 2018, from https://breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf

Cyber Scout. (2017). ITRC: 2017 Annual data breach year-end review. Retrieved June 6, 2018, from https://www.idtheftcenter.org/images/breach/2017Breaches/2017AnnualDataBreachYearEndReview.pdf

Maxfield, D. (2017, October 19). Technology & Data Security in Libraries: A Playbook for Managing today’s Imperative. Retrieved May 28, 2018, from http://www.governing.com/topics/education/technology--data-security-in-libraries-a-playbook-for-managing-todays-imperative.html

Irwin, L. (2017, December 12). 7 tips for spotting a data breach. Retrieved June 2, 2018, from https://www.itgovernance.eu/blog/en/7-tips-for-spotting-a-data-breach

Symantec. (2017). Internet security threat report. Mountain View, CA: Symantec Corporation, USA. Retrieved May 28, 2018, from https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf.

Downloads

Published

08-07-2018

How to Cite

Sarkar, I. (2018). Data Breach: Key to Prevention and Intrusion Detection the Risk of a Library. Indian Journal of Information Sources and Services, 8(2), 8–11. https://doi.org/10.51983/ijiss.2018.8.2.535