Data Breach: Key to Prevention and Intrusion Detection the Risk of a Library
DOI:
https://doi.org/10.51983/ijiss.2018.8.2.535Keywords:
Security Breach, Dark Web, ITRC, VPN, PLA, Ransomware, PhishingAbstract
The problem of protecting information and data flows has existed from the very first day of information exchange however advanced Information Communication Technology and information management systems become more and more powerful and distributed. In this article the author aver that the strategy need to implement measures to protect library from the rise of leak confidential information, both accidentally and maliciously, at tremendous cost in money, privacy, national security, and reputation.
References
Lyttle, M. A., & Walsh, S. D. (2015, March 20). Protecting your library against data breach. Retrieved May 23, 2018, from http://publiclibrariesonline.org/2015/03/protecting-your-library-against-a-data-breach/
[Author not specified]. (2017, October). Library patrons in 10 western Wisconsin counties affected in data breach. Retrieved May 26, 2018, from http://www.week.com/story/36583282/2017/10/Thursday/alert-library-patrons-in-10-western-wisconsin-counties-affected-in-data-breach
Armerding, T. (2018, January 26). The 17 biggest data breaches of the 21st century. Security practitioners weigh in on the 17 worst data breaches in recent memory. Retrieved May 24, 2018, from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html
Gemalto. (2017). The year of internal threats and accidental data breaches. Retrieved May 27, 2018, from https://breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf
Cyber Scout. (2017). ITRC: 2017 Annual data breach year-end review. Retrieved June 6, 2018, from https://www.idtheftcenter.org/images/breach/2017Breaches/2017AnnualDataBreachYearEndReview.pdf
Maxfield, D. (2017, October 19). Technology & Data Security in Libraries: A Playbook for Managing today’s Imperative. Retrieved May 28, 2018, from http://www.governing.com/topics/education/technology--data-security-in-libraries-a-playbook-for-managing-todays-imperative.html
Irwin, L. (2017, December 12). 7 tips for spotting a data breach. Retrieved June 2, 2018, from https://www.itgovernance.eu/blog/en/7-tips-for-spotting-a-data-breach
Symantec. (2017). Internet security threat report. Mountain View, CA: Symantec Corporation, USA. Retrieved May 28, 2018, from https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.