With all the things that go "bump" in the night, nothing worries administrators and even end users more than a security incident. This webinar will focus on building an understanding of IT Security and the tools that can help mitigate risk. Moreover, attendees will leave with a clear understanding of general informational security terms and processes that they can implement in their library same day to help safeguard and better protect their infrastructure and data. Brian Pichman of the Evolve Project will lead us through putting together components for a Security and Risk Plan and how to properly respond to threats and attacks.
Securing and Safeguarding Your Library SetupBrian Pichman
We will explore various tools, techniques, & procedures to ensure our environment's safety & security. Leave with a list of ideas you can use today within your library.
Ever wonder, "how can I make my home internet more secure" or "how can I make sure my kids are safely browsing the internet"? Join this cat meme filled presentation on how to secure your home's internet; everything from securing your wireless network to tools that you can use to help keep you and your family safe while surfing the web.
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
Step right into a realm where cyber security meets the enchanting world of Harry Potter! Join Brian Pichman, our fearless Defense Against the Dark Arts wizard, as he unveils the secrets to safeguarding our digital realms. Prepare to be captivated as Brian illuminates the spellbinding techniques of encryption, firewalls, and intrusion detection, equipping us to fortify our cherished data against the sinister forces of the digital realm.
But beware! Just like in the magical world, treacherous adversaries prowl the shadows. Brian will expose the dark arts of phishing, ransomware, and social engineering, empowering us to defend our digital castles. Engrossed in tales of peril and armed with ancient cyber security spells, this captivating presentation promises to leave you spellbound and ready to protect yourself in this ever-evolving landscape. So grab your wands and brace yourselves as Brian Pichman conjures a shield of protection, ensuring the safety of our digital realms against the forces of darkness. Together, we shall prevail in this journey of cyber security and magic.
CyberSecurity - Computers In Libraries 2024Brian Pichman
Protecting privacy and security while leveraging technology to accomplish positive change is becoming a serious challenge for individuals, communities, and businesses. This workshop, led by expert leaders and practitioners, covers personal and organizational privacy as well as top security issues for libraries and their communities, especially the implications of AI. If you don’t have a security plan in place, are unsure of where to even start to make sure your library is secure, or have an existing plan in place but want to cross your T’s and dot your I’s, come to this interactive workshop.
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
Securing and Safeguarding Your Library SetupBrian Pichman
We will explore various tools, techniques, & procedures to ensure our environment's safety & security. Leave with a list of ideas you can use today within your library.
Ever wonder, "how can I make my home internet more secure" or "how can I make sure my kids are safely browsing the internet"? Join this cat meme filled presentation on how to secure your home's internet; everything from securing your wireless network to tools that you can use to help keep you and your family safe while surfing the web.
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
Step right into a realm where cyber security meets the enchanting world of Harry Potter! Join Brian Pichman, our fearless Defense Against the Dark Arts wizard, as he unveils the secrets to safeguarding our digital realms. Prepare to be captivated as Brian illuminates the spellbinding techniques of encryption, firewalls, and intrusion detection, equipping us to fortify our cherished data against the sinister forces of the digital realm.
But beware! Just like in the magical world, treacherous adversaries prowl the shadows. Brian will expose the dark arts of phishing, ransomware, and social engineering, empowering us to defend our digital castles. Engrossed in tales of peril and armed with ancient cyber security spells, this captivating presentation promises to leave you spellbound and ready to protect yourself in this ever-evolving landscape. So grab your wands and brace yourselves as Brian Pichman conjures a shield of protection, ensuring the safety of our digital realms against the forces of darkness. Together, we shall prevail in this journey of cyber security and magic.
CyberSecurity - Computers In Libraries 2024Brian Pichman
Protecting privacy and security while leveraging technology to accomplish positive change is becoming a serious challenge for individuals, communities, and businesses. This workshop, led by expert leaders and practitioners, covers personal and organizational privacy as well as top security issues for libraries and their communities, especially the implications of AI. If you don’t have a security plan in place, are unsure of where to even start to make sure your library is secure, or have an existing plan in place but want to cross your T’s and dot your I’s, come to this interactive workshop.
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
Ready to avoid crowded stores and online scammers during the holidays? Join Michele Chubirka as she goes through:
-Tips for safe online shopping and securing your banking information
-Protecting yourself from internet scams, phishing and fraud
Safeguard your personal information against identity theft
-How to use Anti-virus and other security software to keep your digital information safe.
Acpe 2014 Internet Anonymity Using TorJack Maynard
Security presentation on Tor at ACPEnw, a Pacific Northwest regional nonprofit association for the educational technology community dedicated to the support of administrative, information and instructional technology.
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
When we talk about security for your library, we should understand some of the tools people may use to harm your network and infrastructure. In this session, learn how hackers may hack and ways to protect yourself. IT security is more than just a buzzword; it’s a necessity to understand and implement the correct measures to keep you, your library, and your patrons safe.
The Internet is a fun place to be, but it is full of dangers too.This presentation helps you understand:
a. Types of Threats on the Internet
b. The Dos of Internet Security
c. The Don'ts of Internet Security
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Introduction:
In the fast-evolving digital age of the 21st century, cybersecurity has emerged as a paramount concern for governments, businesses, and individuals. The Workshop on Cybersecurity is a comprehensive and immersive event designed to address the challenges posed by cyber threats and equip participants with the knowledge and tools to safeguard their digital assets. This workshop, to be held over five days, seeks to empower attendees with the latest insights and practices in cyber defense, fostering a culture of resilience and proactive security measures.
Day 1: Understanding the Cyber Landscape
The workshop commences with a deep dive into the complex cyber landscape that defines modern society. Distinguished experts from the cybersecurity field will present an overview of the ever-changing cyber ecosystem, highlighting its interconnectedness and vulnerabilities. Participants will gain valuable insights into the roles of governments, corporations, and individuals in shaping the cyber landscape.
Key topics covered will include the global impact of cyberattacks, the importance of international collaboration in countering cyber threats, and the significance of public-private partnerships. This foundational knowledge will serve as the basis for the subsequent discussions on cyber defense strategies.
Day 2: Unraveling Cyber Threats and Attack Vectors
Day two focuses on understanding the multitude of cyber threats and attack vectors that can target individuals and organizations. Renowned cybersecurity researchers will present real-life case studies of recent cyber incidents, ranging from nation-state-sponsored attacks to financially motivated hacking campaigns. Participants will gain a comprehensive understanding of the tactics employed by threat actors and the motivations behind their actions.
Through interactive sessions, attendees will be immersed in simulated cyber-attack scenarios, enabling them to identify and mitigate potential threats effectively. The day will emphasize the need for a proactive and adaptive approach to cybersecurity, as well as the importance of threat intelligence sharing to bolster collective defense capabilities.
Day 3: Building Robust Cyber Defense Strategies
Day three delves into the development and implementation of robust cyber defense strategies. Experts in the field will introduce participants to cutting-edge tools and technologies that can effectively detect, prevent, and respond to cyber threats. Topics covered will include advanced threat hunting techniques, next-generation firewalls, intrusion detection systems, and incident response best practices.
Participants will engage in practical workshops, enabling them to apply the newly acquired knowledge and skills to real-world scenarios. Emphasis will be placed on the importance of continuous monitoring, vulnerability management, and the establishment of an agile security infrastructure capable of adapting to emerging
This is ppt was prepared by referring more than 4 ppts
It includes all the details about the hacking and most you cant get from internet
Because i get something threw doing things on my system
All the information are said here is absolutely true
the viewers are consent to use this ppt
AI Coding, Tools for Building AI (TBLC AI Conference)Brian Pichman
Embark on an engaging journey into the world of AI coding with Brian Pichman from the Evolve Project. This advanced track offers participants hands-on experiences in coding AI, blending theory with practice. Explore the latest games/gadgets/gizmos designed to educate and enhance skills in coding alongside AI. This session is perfect for those who are curious about what's it take to code AI and learn about cutting-edge developments in AI technology
Building Your Own AI Instance (TBLC AI )Brian Pichman
Join Brian Pichman from the Evolve Project in an enlightening session focusing on the creation of a building your own AI chatbot. This advanced track delves into the practical aspects of utilizing the OpenAI API alongside other innovative software products. Participants will gain invaluable insights into the processes and technologies involved inbuilding a custom AI instance. This track is ideal for those seeking adeeper understanding of AI integration and personalization in the realm. of conversational AI.
More Related Content
Similar to Securing & Safeguarding Your Library Setup.pptx
How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
Ready to avoid crowded stores and online scammers during the holidays? Join Michele Chubirka as she goes through:
-Tips for safe online shopping and securing your banking information
-Protecting yourself from internet scams, phishing and fraud
Safeguard your personal information against identity theft
-How to use Anti-virus and other security software to keep your digital information safe.
Acpe 2014 Internet Anonymity Using TorJack Maynard
Security presentation on Tor at ACPEnw, a Pacific Northwest regional nonprofit association for the educational technology community dedicated to the support of administrative, information and instructional technology.
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
When we talk about security for your library, we should understand some of the tools people may use to harm your network and infrastructure. In this session, learn how hackers may hack and ways to protect yourself. IT security is more than just a buzzword; it’s a necessity to understand and implement the correct measures to keep you, your library, and your patrons safe.
The Internet is a fun place to be, but it is full of dangers too.This presentation helps you understand:
a. Types of Threats on the Internet
b. The Dos of Internet Security
c. The Don'ts of Internet Security
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Introduction:
In the fast-evolving digital age of the 21st century, cybersecurity has emerged as a paramount concern for governments, businesses, and individuals. The Workshop on Cybersecurity is a comprehensive and immersive event designed to address the challenges posed by cyber threats and equip participants with the knowledge and tools to safeguard their digital assets. This workshop, to be held over five days, seeks to empower attendees with the latest insights and practices in cyber defense, fostering a culture of resilience and proactive security measures.
Day 1: Understanding the Cyber Landscape
The workshop commences with a deep dive into the complex cyber landscape that defines modern society. Distinguished experts from the cybersecurity field will present an overview of the ever-changing cyber ecosystem, highlighting its interconnectedness and vulnerabilities. Participants will gain valuable insights into the roles of governments, corporations, and individuals in shaping the cyber landscape.
Key topics covered will include the global impact of cyberattacks, the importance of international collaboration in countering cyber threats, and the significance of public-private partnerships. This foundational knowledge will serve as the basis for the subsequent discussions on cyber defense strategies.
Day 2: Unraveling Cyber Threats and Attack Vectors
Day two focuses on understanding the multitude of cyber threats and attack vectors that can target individuals and organizations. Renowned cybersecurity researchers will present real-life case studies of recent cyber incidents, ranging from nation-state-sponsored attacks to financially motivated hacking campaigns. Participants will gain a comprehensive understanding of the tactics employed by threat actors and the motivations behind their actions.
Through interactive sessions, attendees will be immersed in simulated cyber-attack scenarios, enabling them to identify and mitigate potential threats effectively. The day will emphasize the need for a proactive and adaptive approach to cybersecurity, as well as the importance of threat intelligence sharing to bolster collective defense capabilities.
Day 3: Building Robust Cyber Defense Strategies
Day three delves into the development and implementation of robust cyber defense strategies. Experts in the field will introduce participants to cutting-edge tools and technologies that can effectively detect, prevent, and respond to cyber threats. Topics covered will include advanced threat hunting techniques, next-generation firewalls, intrusion detection systems, and incident response best practices.
Participants will engage in practical workshops, enabling them to apply the newly acquired knowledge and skills to real-world scenarios. Emphasis will be placed on the importance of continuous monitoring, vulnerability management, and the establishment of an agile security infrastructure capable of adapting to emerging
This is ppt was prepared by referring more than 4 ppts
It includes all the details about the hacking and most you cant get from internet
Because i get something threw doing things on my system
All the information are said here is absolutely true
the viewers are consent to use this ppt
Similar to Securing & Safeguarding Your Library Setup.pptx (20)
AI Coding, Tools for Building AI (TBLC AI Conference)Brian Pichman
Embark on an engaging journey into the world of AI coding with Brian Pichman from the Evolve Project. This advanced track offers participants hands-on experiences in coding AI, blending theory with practice. Explore the latest games/gadgets/gizmos designed to educate and enhance skills in coding alongside AI. This session is perfect for those who are curious about what's it take to code AI and learn about cutting-edge developments in AI technology
Building Your Own AI Instance (TBLC AI )Brian Pichman
Join Brian Pichman from the Evolve Project in an enlightening session focusing on the creation of a building your own AI chatbot. This advanced track delves into the practical aspects of utilizing the OpenAI API alongside other innovative software products. Participants will gain invaluable insights into the processes and technologies involved inbuilding a custom AI instance. This track is ideal for those seeking adeeper understanding of AI integration and personalization in the realm. of conversational AI.
AI Workshops at Computers In Libraries 2024Brian Pichman
While AI holds tremendous potential for libraries, it also comes with significant concerns and the potential for harm. We find ourselves sailing uncertain waters; there are few guardrails governing AI's use. Even as we acknowledge this truth, we must also note that library staff are already experimenting with the use of AI chatbots (most commonly ChatGPT), generative AI design tools (like Midjourney), and other variations of AI technology. In short, we have great potential, pitfalls, and a total lack of clarity. It is only through the thoughtful development of policy, procedure, and professionals that we can hope to articulate a vision for the ethical use of AI in our libraries. Join this conversation about new disruptive technology, take a deep breath, and get to work laying a foundation of policy guidelines and staff development to navigate the uncertain road ahead.
This interactive and hands-on workshop allows you to play and experiment with new tools which will spark ideas for the future of your library and community activities. It focuses on OpenAI’s API and how to get started building personalities in AI. It explores various tools to create AI images, videos, and more. Filled with tips, it will definitely be fun!
Community Health & Welfare: Seniors & Memory CareBrian Pichman
Memory care is becoming a huge topic in libraries around the world. How do we support seniors and their caregivers affected by conditions such as Alzheimer's or dementia? This session explores tools, tips, and program ideas to enable your library to include these groups and empower them to use the library in a safe and inviting way.
Robotics in Libraries - Education and AutomationBrian Pichman
Explore how robotics is reshaping various industries and how they may create new possibilities within library environments. This session explores a wide gambit of information — from the basic STEAM toys that can teach coding to industry-level equipment and their applications in libraries, including sorting systems, interactive learning companions, and assistive devices for patrons with disabilities. Gain insights into the benefits and limitations of robotics, and explore future trends in the field.
Key Points:
Overview of robotics technologies and their relevance to libraries.
Benefits and limitations of integrating robotics into library operations.
Various Edutech Products that teach robotics.
Future trends and possibilities for robotics in the library environment.
NCompass Live - Pretty Sweet Tech - Evolve ProjectBrian Pichman
Presentation for NCompass Live
Brian Pichman of the Evolve Project is the man behind the scenes, transforming how libraries engage with technology. Here at the Commission, he helped a lot with the Tech Kits Through the Mail. If you’ve gotten a kit from us, it’s because he tracks tech trends, works with tech gadget startups, and helps build solid strategies to connect communities with transformative technology.
Honestly, he’s helped me a lot over the years. But I can’t be selfish. I decided to share his expertise with you all! Turns out Brian does way more than I ever knew possible.
In this session we will get Brian talking about all the cool things he has going on:
Explore how his pilot programs of new games & gadgets are shaping the future of libraries through makerspaces, innovation spaces, and leading edge programming
Learn how Brian helps libraries embrace AI, VR and AR to revolutionize library services and enhance accessibility and engagement for all.
Discover his passion for open-source solutions to drive positive change, and his recent endeavors with ByWater Solutions, a leading provider of open-source library software.
Dig into his work with libchalk, a web hosting platform designed specifically to help libraries host digital content, websites, courses, and online resource libraries.
The real question is, what doesn’t he do? He can help your library too. Find out how.
AI tools in Scholarly Research and PublishingBrian Pichman
Discover how AI is revolutionizing research methodologies and publishing processes, making data analysis more efficient and streamlining academic workflows. This talk will cover the latest trends, challenges, and future opportunities of integrating AI in academia. Ideal for scholars, publishers, and tech enthusiasts aiming to stay ahead in the digital age. We will also explore new tools and how to build your own environments.
Tech Trends 2024 and Beyond - AI and VR and MOreBrian Pichman
Join Brian Pichman, the tech geek from the Evolve Project, in a
jolly tech-filled sleigh ride through the hottest trends that'll make
this holiday season merrier for librarians! From digital AI elves
to magical augmented reality, this fun-packed presentation will
unwrap the tech wonders that'll keep libraries ahead of the
game in the North Pole of innovation. Don't miss out on the
holiday cheer and the chance to sprinkle some digital snow on
your library's future!
Content Creation and Social Media Tools for LibrariesBrian Pichman
Discover the transformative role of Artificial Intelligence in shaping content creation and social media engagement within library environments. This presentation explores how AI-driven tools are revolutionizing the way libraries share information, curate content, and connect with their communities. Explore practical applications of AI in generating personalized content, automating social media interactions, and enhancing user engagement, all while maintaining the unique character of library services.
Key Points:
Tailoring library content through AI: Customized reading recommendations, curated lists, and more.
Amplifying outreach with AI-powered social media strategies, boosting community interaction.
Ethical considerations in AI-generated content for libraries: Striking the right balance.
Real-world examples of successful AI-driven library campaigns that foster engagement.
Collaborative possibilities: How libraries can work with AI to enhance user experiences.
Future prospects: Navigating the evolving landscape of AI and its integration in library services.
Artificial Intelligence (AI) – Powering Data and Conversations.pptxBrian Pichman
Uncover the potential of Artificial Intelligence in revolutionizing data analysis and enhancing conversational experiences within library contexts. This presentation explores how AI technologies are redefining data management, insights, and user interactions in libraries. Gain insights into how AI-driven data analysis can optimize collection management, resource allocation, and user engagement. Additionally, learn about the implementation of AI-powered conversational interfaces to provide seamless library support and guidance.
Key Points:
- Enhancing library data analysis: From catalog optimization to user behavior insights using AI.
- Leveraging AI to automate routine data-related tasks and enhance decision-making.
- Conversational AI in libraries: Creating virtual assistants and chatbots for user assistance.
- Merging human expertise with AI: Crafting effective user interactions in library services.
- Case studies showcasing libraries streamlining operations and enriching user experiences through AI.
- Future horizons: The evolving role of AI in data management and personalized library interactions.
Join Brian Pichman from the Evolve Project as he shares a new strategy he hopes libraries adopt to strengthen their connection with themselves, their team, and the community. By setting up a 40 Day Challenge (and yes challenges will be shared in this presentation) you can take yourself and your library to a whole new level of librarianship.
NCompass Live: AI: The Modern Day Pandora's BoxBrian Pichman
Artificial Intelligence (AI) has unfurled a world of possibilities and opportunities, but just like Pandora's box, it comes with its own set of challenges and ethical conundrums. Brian Pichman of the Evolve Project takes you on a deep dive into the complex landscape of AI, its implications, ethical concerns, and its transformative role in both private and public sectors.
Key Takeaways:
Understand the multifaceted nature of AI and its applications.
Explore the ethical questions surrounding AI, from data privacy to job displacement.
Discover how AI can serve as a force for good and where it may fall short.
Gain insights into how industries are adopting AI technologies for innovative solutions.
Learn actionable strategies for responsibly integrating AI into your organization or research.
AI can help digest information efficiently, develop creative solutions to complex problems, & more. We will explore using hands-on tools that can be used by marketing teams, tech teams, & more. We will break down what AI is, how it works, & some limitations or challenges.
Join Brian Pichman and his Consumer Electronic Show (CES) recap. CES is the ultimate tech conference that unveils the latest and greatest in tech gadgets and gizmos. Brian will share his findings of the next must-have technology announced at the event, along with some library partnerships that can help evolve your library’s maker spaces. Learn more about tech trends such as AI, Metaverse, Robotics, and more with some hands-on time with the latest and greatest gadgets.
By now, most people have heard of ChatGPT as a conversational AI that can create conversations and answer questions. This flashy technology has helped introduce AI to the masses, yet this type of conversational AI has been around for almost a while in various formats. This session shows some of the less-known things you can do with AI, such as creating content for your blog/website, creating videos, generating marketing material, tweets, and more. Brian Pichman of the Evolve Project will share some access to technology to let participants play and create AI content to bring back to their library.
STEM Programming Ideas at the Library.pdfBrian Pichman
With all the latest gadgets, gizmos, and everything in between, what are the latest programming ideas within library spaces? How can we use AI in different ways to engage our community? What about low costs or low-tech opportunities? Join Brian Pichman of the Evolve Project as he highlights some awesome programming ideas that you can implement within your library spaces! Bring in more patrons, build more collaboration, and improve your community outreach with some out-of-the-box STEM activities that really get your creative minds flowing.
Join Brian Pichman and his Consumer Electronic Show (CES) recap. CES is the ultimate tech conference that unveils the latest and greatest in tech gadgets and gizmos. Brian will share his findings of the next must-have technology announced at the event, along with some library partnerships that can help evolve your library's maker spaces.
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptxBrian Pichman
How can libraries explore new opportunities to enhance staff retention, attract new ideas, and create even better library programs? This webinar will work through a variety of leadership techniques as well as introduce software and tools to bridge gaps between teams, enhance communication, and foster collaboration. After attending this webinar, you will leave with a variety of new ideas to really expand what your library can do by using the team you have. The mechanics we work through can also be applied to the public and offer new incentives for visiting the library - whether that's virtually or physically.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
3. Agenda
• Understanding Anonymity, Privacy, and Everything in Between
• Protecting Yourself
• Getting Hacked
• Best Security Tool: A Policy That Is Followed
• Tools for Protecting Your Network
6. Cloak of Invisibility
Top reasons why people want to hide their IP address:
1. Hide their geographical location
2. Prevent Web tracking
3. Avoid leaving a digital footprint
4. Bypass any bans or blacklisting of their IP address
5. Perform illegal acts without being detected
7. Onion Routing, Tor Browsing
• Technique for anonymous communication to take place over a network.
The encryption takes place at three different times:
• Entry Node
• Relay Node
• Exit Node
• Tor is made up of volunteers running relay servers. No single router knows
the entire network (only its to and from).
• Tor can bypass internet content filtering, restricted government networks
(like China) or allow people to be anonymous whistle blowers.
• Tor allows you to gain access to “.onion” websites that are not accessible
via a normal web browser.
• Communication on the Dark Web happens, via Web, Telnet, IRC, and other
means of communication being developed daily.
8. Cloak of Invisibility
How do you Hide an 800lb Gorilla?
• Use Free Wifi (To Hide your location)
• Use a Secure Web Browser
• Use a Private VPN
• Go back to Dial-up
• Setup RF Data Transfer over CB Radio
Waves
• Use Kali linux to hack someone else’s
Wifi Encryption.
• Setup long-range Wireless Antennas
9. Cloak of Invisibility
• How to hide yourself?
• Private VPN
• You want a TOTALLY anonymous service.
• Look for one that keeps no log history (Verify via reviews)
• Look at Bandwidth & Available Servers
• Recommendations:
• Private Internet Access (PIA)
• TorGuard VPN
• Pure VPN
• Opera Web Browser
• Avast AntiVirus (SecureLine)
• Worst Case: Free WIFI
11. Dial Up?
• Use an ISPs like NetZero that can be registered with fictitious personal
information, and to which you can connect with caller ID disabled
• Makes it a bit more difficult to identity “you”
12. Free WiFi
• Sometimes a good alternative if
you need to do something
anonymously
• Nothing is ever 100% anonymous
• Some public wifi does track
websites you access, what you
do, etc.
• Make sure your computer name
you are using doesn’t include your
actual name
14. Best Tips and Practices
Do
• Use a device that you’ve never
signed into anything ”personal
on”.
• Pro Tip: buy a computer from a
Pawn Shop or Garage Sale
Don’t
• While on a VPN or any other
anonymous tool; don’t sign into
personal accounts (banks, social
media, etc).
• If posting, don’t use anything
that could be associated to you
15. Easy Wins for Privacy
• 10 Minute Email
• https://10minutemail.com/
• Temporarily get an email box that’s anonymous and disappears after 10
minutes
• Dr Cleaner (Mac) or Eraser (Win) can overwrite files on your
computer with “blank” data to make file recovery near impossible.
• Tools like Recuva is free softwares to allow you to restore deleted files.
16. What People Pay For Your Data
• https://www.fortinet.com/blog/industry-trends/the-true-value-of-
data.html
• Credit Card Numbers: 50 cents to 2.50 per card.
• Bank Account Information (logins/information): $1.00 to $70
• Medical Records: $10-$20
19. Tools For Use
• Sites to protect yourself all the time (not free)
• IdentityGuard.com
• LifeLock.com
• Sites to monitor when breached data gets related (this is free)
• Haveibeenpwned.com
• Password Management Sites (like lastpass.com)
• Don’t have the same password for all your sites.
• Don’t write your passwords down on a post-it-note and leave it at your desk
23. Credit Card Tools for Online Shopping
• Check out Privacy.Com
• https://privacy.com/join/473XB
shameless plug
24. Basic Tips
• Accept only people you know to personal and professional accounts
• Never click on links from people you don’t know.
• Especially if they are using a url shortner: bit.ly, tinyurl.com, etc
• https://www.urlvoid.com/ - test the website to see if its safe
• https://snapito.com/ gets a screenshot of what will load on the site
• https://www.site-shot.com/ get a screenshot of what will load on site
• If there are people claiming to be you on social media, it’s best to get
your account “verified” on those social media platforms
• This lets users distinguish that you’re the actual official account
• Dual factor authenticate all of your social media logins
25. Checking Your Accounts / Name Online
• Use this site to check your usernames: https://namechk.com/
• The next is a tool searches through your email with things you may
have signed up for (I've paid for their premium service as well, not
really worth it, the free does just
fine) https://brandyourself.com/privacy-overview.
• This tool: https://email-lookup.online/index.php searches public
searches to see what links. Its similar
to https://www.spokeo.com/email-search.
26.
27. Myths
• I’m/my library not worth being attacked.
• Hackers won’t guess my password.
• I/we have anti-virus software.
• I’ll/we know if I/we been compromised.
28. Understanding Breaches and Hacks
• A hack involves a person or group to gain authorized access to a
protected computer or network
• A breach typically indicates a release of confidential data (including
those done by accident)
• Both of these require different responses if breaches/hacks occur.
29.
30. The Costs Of Breaches
• This year’s study found the average consolidated total cost of a data breach
is 3.9 million dollars and in the US the average is actually higher at 8.19
million.
[IBM 2019
http://www-03.ibm.com/security/data-breach/]
• Data Breached Companies Experience…
• People loose faith in your brand
• Loss in patrons
• Financial Costs
• Government Requirements,
Penalties, Fees, etc.
• Sending of Notifications
• Payment of Identity Protection or
repercussions.
https://betanews.com/2016/02/10/the-economic-cost-of-being-hacked/
35. BackTrack can get you ALOT
• BackTrack was a Linux distribution that focused on security based on
the Knoppix Linux distribution aimed at digital forensics and
penetration testing use. In March 2013, the Offensive Security team
rebuilt BackTrack around the Debian distribution and released it
under the name Kali Linux.
https://en.wikipedia.org/wiki/BackTrack
38. Increases Efficiency
• Having a security policy allows you to be consistent in your approach
to issues and how processes should work.
• It should outline how and what to do, and repeatable across your
organization.
• Everyone is doing XYZ the same way and on the same page.
39. Accountability, Discipline, and Penalties
• Think of it as a contract – for legal purposes – that you have taken the steps
needed to secure your organization.
• Need to define penalties when violations occur. People need to know the
consequences are for failure to comply – both from a legal and HR standpoint
or even access permissions.
• Policies and procedures provide what the expectation is and how to achieve
that expectation. It should define what the consequence are for failure to
adhere.
40. Education For Employees
• By reading these policies (and signing them), it helps educate your
employees (and users) the sense of ownership for assets and data.
• Everything from advice on choosing the proper passwords, to
providing guidelines for file transfers and data storage, internet access
and rules, will help to increase employees’ overall awareness of
security and how it can be strengthened
41. Addresses Threats and Risks
• A good policy should address all threats, strategies to decrease the
vulnerabilities of those threats, and how to recover if those threats
became actionable.
• This makes the “what do we do if someone hacks our network” a
defined process already and who to call and what to do to mitigate
further damage.
42. Access Definitions and Permissions
• A good policy would outline who accesses what and why. This makes
reporting a security violation easier and streamlined.
• Policies are like bouncers at a night club
• It states who has access to the VIP section of the club, why, and any reasons
to allow entry.
• Without these rules, VIP wouldn’t be really VIP.
44. Why do People Attack?
• Financial Gain
• Stocks
• Getting Paid
• Selling of information
• Data Theft
• For a single person
• For a bundle of people
• Just Because
• Malicious
45. How to navigate and prevent wrong turns
• Who are the people we’re
trying to avoid?
Hacker Groups
• Lizard Squad. ...
• Anonymous. ...
• LulzSec. ...
• Syrian Electronic Army. ...
• Chaos Computer Club (CCC) ...
• Iran's Tarh Andishan. ...
• The Level Seven Crew. ...
• globalHell.
46. So what Do You Need to Protect?
• Website(s)
• ILS
• Staff Computers
• And what they do on them
• Patron Computers
• And what they do on them
• Network
• And what people do on them
• Stored Data, Files, etc.
• Business Assets
• Personal Assets
• ….anything and everything that is plugged in…
47. Outside
• Modem Router Firewall
Switches
• Servers
End User
• Phones
• Computers
• Laptops
48. Outer Defenses (Routers/Firewalls)
• Site to Site Protection (Router to
Router or Firewall to Firewall)
• Encrypted over a VPN Connection
• Protection With:
• IDS
• IPS
• Web filtering
• Antivirus at Web Level
• Protecting INBOUND and OUTBOUND
49. Unified Threat Management
• Single Device Security
• All traffic is routed through a unified
threat management device.
50. Areas of Attack On Outer Defense
External Facing Applications
• Anything with an “External IP”
• NAT, ONE to ONE, etc.
• Website
• EZProxy Connection
• Custom Built Web Applications
or Services
Internal Applications
• File Shares
• Active Directory (usernames /
passwords)
• Patron Records
• DNS Routing
• Outbound Network Traffic
• Who is going where
51. Attacks
• Man in the Middle
• Sitting between a conversation and either listening or altering the data as its sent
across.
• DNS Spoofing (https://null-byte.wonderhowto.com/how-to/hack-like-pro-spoof-dns-
lan-redirect-traffic-your-fake-website-0151620/) set up a fake website and let people
login to it.
• D/DoS Attack (Distributed/Denial of Service Attack)
• Directing a large amount of traffic to disrupt service to a particular box or an entire
network.
• Could be done via sending bad traffic or data
• That device can be brought down to an unrecoverable state to disrupt business
operations.
• Sniffing Attacks
• Monitoring of data and traffic to determine what people are doing.
55. Updates, Patches, Firmware
• Keeping your system updated is important.
• Being on the latest and greatest
[software/update/firmware] isn’t always
good.
• Need to test and vet all updates before
implementation
• If you can – build a dev environment to
test and validate.
56. Casper Suite / JAMF - https://www.jamf.com/products/jamf-pro/
58. Protecting End Devices
• Protecting Assets
• Business Assets
• Thefts
• Hacking
• Personal Devices
• Security Risk
• Usually pose an INBOUND threat
to your network
59.
60. Passwords
• Let’s talk about Passwords
• Length of Password
• Complexity of password
requirements
• DO NOT USE POST IT
NOTES
• A person’s “every day
account” should never
have admin rights to
machines.
• That includes your IT
Folks!
66. Pulling Everything Together
• Do A Risk Assessment
• Develop Policies
• Training Plans For Staff
• Implement tools to help rotect
67. IT Admin Tricks for Security
• Administrative Accounts are easy to figure out if they
are something like “administrator” ”root” or “power
users”. At the same time, no employee should have
their account as a full admin.
• Instead, give them their own username for admin access (like
brian.admin)
• Change the default “login” pages for sites to something
that’s not www.mysitename.com/login. Bots look for
this and attack.
• My Drupal Site login page is www.evolveproject.org/catpower
• User Awareness is key to any secure organization. Teach
users how to identify potential threats and how to
respond quickly.
• Avoid shared accounts. One account should only be
used by one person.
78. Email for Kids
• There are service providers that can help manage kid’s emails and
help protect them.
• Google has an option where you can manage a Google Account for
your child:
https://support.google.com/families/answer/7103338?hl=en
79. Apple iOS Parental Controls
• https://support.apple.com/en-us/HT201304
• https://www.apple.com/families/
These are also the people that use TorBrowser as well to hide themselves
Infrastructure:
Network (Switches, Routers, Firewalls, Modem)
WiFi Network
VPN Connections
Servers (File Storage, Active Directory, Application Servers).
Phone System, Security System, Website, etc.
End Clients
End User PCs and other Peripherals
Copiers, Scanners, Printers
Software