Showing posts with label Internet security. Show all posts
Showing posts with label Internet security. Show all posts

Thursday, April 18, 2019

Facebook Reprimanded for Latest User Privacy Issue

After Facebook "asked new users for their email passwords as part of the sign-up process," the resulting contact list grab has been reversed and the information has not been disseminated to other parties, according to the company ("Facebook Uploaded Email Contacts of 1.5M Users Without Consent," The Guardian (UK), April 18, 2019). The potential problem with this Facebook practice was recognized earlier this month when the company was trying to streamline account registration by capturing email passwords to identify new users.

Review selected hard copy/online library books related to privacy and computer security at LSC-CyFair Branch Library. Click the title of a listed item, select the "Place Hold" button in the listing, and enter your library card number and PIN for each title you want to request for pick up at the library.

Use these subject words and phrases to find more information in the library catalog:
  • electronic surveillance
  • identity theft
  • internet safety
  • internet security
  • privacy
200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline by Jeni Rogers
Adams Media, 2019
call number: 005.8 Rog

"Discover simple strategies for protecting your personal and confidential information on and offline with this essential and easy-to-understand guide...there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store--and even you have the ability to unknowingly reveal your private information to everyone from thieves to busybodies. But you don't need to hire a specialist to keep your information safe--you can do it yourself with these 200+ easy-to-implement tactics" - publisher's summary excerpt

The Known Citizen: A History of Privacy in Modern America by Sarah E. Igo
Harvard University Press, 2018
call number: 323.44 Igo

"The Known Citizen reveals how privacy became the indispensable language for monitoring the ever-shifting line between our personal and social selves. Igo's sweeping history, from the era of "instantaneous photography" to the age of big data, uncovers the surprising ways that debates over what should be kept out of the public eye have shaped U.S. politics and society. It offers the first wide-angle view of privacy as it has been lived and imagined by modern Americans." - publisher's summary excerpt

Habeas Data: Privacy vs. the Rise of Surveillance Tech by Cyrus Farivar
Melville House, 2018
call number: 342.73 Far

"Until the 21st century, just about all of our activities were private by default, public through effort; today anything that touches digital space has the potential (and likelihood) to remain somewhere online forever. That means all of the technologies that have made our lives easier, faster, better, more efficient have also simultaneously made it easier to keep an eye on our activities. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy." - publisher's summary excerpt

Sunday, September 30, 2012

Cybersecurity Inadequate to Combat Attacks on U.S. Banks

An overseas organization may be behind the recent spate of bank websites being overloaded with heavy traffic disrupting online access to accounts ("Cyber Attacks on U.S. Banks Expose Computer Vulnerabilities," Bloomberg Businessweek, September 28, 2012). To stem the tide of these distributed denial-of-service attacks (DDoS) on financial institutions, the White House may issue an executive order to set up new security systems to prevent downtime of "vital computer networks" since cybersecurity legislation is stalled in Congress. This latest round of cyber assaults on banks created inconvenience for customers, but not theft of secure data.

Review selected library titles related to cybersecurity and computer crimes at LSC-CyFair Branch Library. Click the title of a listed item, select the "Request" button in the listing, and enter your library card number and PIN for each title you want to reserve for pick up at the library.

Use these subject words and phrases to find more in the library catalog:
  • business data security
  • computer crimes
  • computer hackers
  • computer networks security
  • computer security
  • data protection
  • information technology security
  • Internet security
Computer Security Fundamentals book coverComputer Security Fundamentals by Chuck Easstom - Pearson, 2012.
call number: 005.8 Eas
"Beginning with a general introduction to computer security, the volume covers topics such as Internet fraud and abuse, denial of service attacks, malware, hacking techniques, industrial espionage, encryption, developing security policies, network penetration testing, and basic computer forensics techniques. . .Easttom is a certified IT professional and the author of several books on computer and networking topics." - publishers summary \excerpt

America the Vulnerable book coverAmerica the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare by Joel Brenner - Penguin, 2011.
call number: 364.168 Bre
"Brenner, a former inspector general for the National Security Agency, raises the alarm about inadequately addressed threats and vulnerabilities to computer and communications systems. This problem has been addressed by administrations unsuccessfully since the 1980s and Brenner believes more needs to be done soon. This alarming account by an expert is worthy of serious attention from policy makers and average readers alike." - Publishers Weekly review excerpt

Cybersecurity: Public Sector Threats and Responses
by Kim J. Andreasson- CRC, 2012. call number: EBSCO eBook Collection Database (see title link to access book)
"Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve." - publishers summary excerpt