Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Preventing Cybercrime in Libraries

This is a project I completed with classmate Margaret Kidd. I did most of the layout work and enjoyed PhotoShopping public domain True Crime Detective book covers to suit our needs.

  • Login to see the comments

  • Be the first to like this

Preventing Cybercrime in Libraries

  1. 1. By Margaret Kidd and Mary Rayme IS 585, Fall 2013 1
  2. 2. What is Cybercrime? Crime committed by use of a computer. 2
  3. 3. • cyberbullying • cyberstalking • cyberwarfare • child pornography • extortion • fraud • hacking What is Cybercrime? 3
  4. 4. What is Cybercrime? • identity theft • phishing • phreaking • ransomware • spam • theft and embezzlement • viruses 4
  5. 5. What are the most prevalent cybercrimes in an information environment? 5
  6. 6. Published child pornography arrests in US libraries, 2011-2013 Alaska, Anchorage Loussac Public Library California, Auburn Library California, Foothill Ranch Public Library California, Fresno County Public Library California, Main Street Library, Santa Monica Florida, Florida Atlantic University Library Florida, Harrell Memorial Library Florida, South East Wimberly Library Illinois, Bloomingdale Public Library Illinois, Orland Park Public Library Illinois, Southwest Illinois College Library Indiana, Lawrenceburg Library Kentucky, Louisville Free Public Library Maryland, Queen Anne Public Library Michigan, Kent District Library Missouri, Jefferson College Library Missouri, Metropolitan Community College Library Nevada, Western Nevada College New Jersey, North Plainfield Library New Jersey, Plainsboro Township Public Library Oregon, Monroe County Public Library South Carolina, Oconee County Library South Dakota, Rapid City Public Library Tennessee, First Regional Library Tennessee, Nashville Public Library Tulsa City-County Library, Oklahoma West Virginia, Clay County Public Library West Virginia, Randolph County Public Library West Virginia, Parkersburg-Wood County Public Library 6
  7. 7. Other Top Cybercrimes in an Information Environment • stolen data/altering data • identity theft • info stolen over wifi • pirated music, audiobooks, ebooks • malware, viruses 7
  8. 8. Who polices cybercrime? 8 The Secret Service was the first law enforcement entity to police cybercrime. Since then the responsibility has spread to include: • FBI • CIA • Department of Homeland Security
  9. 9. A Brief History of 9
  10. 10. 1986, The Cuckoo’s Egg 1988, The Morris Worm 1994, Citibank 1998, Back Orifice 1999, The Melissa Virus 2000, Web Denied 2003, Blaster Worm & Blackout 2007, Pentagon 2007, Israel Air Defense Kill Switch 2007, Zeus Botnet 2009, China Attacks Google 2010, Stuxnet 2012, Unlimited Operation 2013, Bitcoin 2014, ? Cybercrime Timeline 10
  11. 11. 11 Who are cybercriminals? 1. US 2. Russia 3. Germany 4. Romania 5. Ukraine 6. Thailand 7. Vietnam 8. Netherlands 9. Lithuania 10. Ireland From “Top 50 Bad Hosts and Networks”, HostExploits’s Worldwide Cybercrime Series. Second Quarter, 2012 – Report.
  12. 12. 12 Can Prevent Cybercrime! Cyber Security Tips for Library Staff and Users
  13. 13. 13 • Our library users expect to have a safe computing environment. • To provide this we must  Be knowledgeable about cybercrime  Educate users
  14. 14. 14 Some steps that libraries can take to prevent cybercrime: • Perform regular anti-virus and anti-malware scans • Use firewalls • Block users from downloading programs onto public computers • Routinely evaluate and update security measures as needed
  15. 15. 15 • Secure browsing: Does not save browser history, search history, download history, or temporary internet files. • Examples: Firefox Private Browsing & Chrome Incognito Browsing • Caution: Files that are downloaded and bookmarks saved will be kept. The ISP and employer can still track the pages you visit. 15
  16. 16. 16 Protect and strengthen passwords: • Never share your passwords with anyone. • Have patrons use passwords to login • Use guest passwords that are frequently changed. 16
  17. 17. 17 • Use a password generator for strong passwords • Example: LastPass a product to generate and manage passwords. • Use a password checker to evaluate password strength.
  18. 18. 18 Two part authentication:  Additional layer of security using password & verification code  Even if password is cracked the account still cannot be accessed without the code
  19. 19. 19 • Modify behavior: Be careful about information that you post on social media as such information could be used to hack your account by guessing passwords or challenge questions. • Click with caution: Do not click on links or open emails that you are unfamiliar with. They could potentially be source of malware. Be aware of phishing scams; do not provide sensitive information.
  20. 20. 20  Public Wifi  Use caution on a public wifi network.  Do not use unsecured wifi for financial or sensitive transactions  Check the network name  Turn off sharing  Turn off wifi capability when not in use  Use a virtual private network. • Clean up Consolidate or close old accounts that could be used by someone to gain access.
  21. 21. 21 The Future of Cybercrime and Cybercrime Prevention • Cyber criminals are continually finding new ways to exploit weaknesses. • Per Project 2020 report: Cyber crimes in 2020 will be adaptations of existing crimes to the technological developments of the next seven to eight years. • New challenges will also emerge such as threats to critical infrastructure and human implants. These will increasingly blur the distinction between cyber and physical attack. 21
  22. 22. 22 What does this mean for libraries? • Be aware of how cybercriminals are evolving and keep up with the latest trends in cyber security. • Part of our mission as information professionals is to educate people. • Be more proactive in educating our users on how to protect their information.
  23. 23. 2323 Any questions? All vintage mag covers from: