
Indian Journal of Information Sources and Services (IJISS)
Data Breach: Key to Prevention and Intrusion Detection the Risk of a Library
Author : Indranil SarkarVolume 8 No.2 July-September 2018 pp 8-11
Abstract
The problem of protecting information and data flows has existed from the very first day of information exchange however advanced Information Communication Technology and information management systems become more and more powerful and distributed. In this article the author aver that the strategy need to implement measures to protect library from the rise of leak confidential information, both accidentally and maliciously, at tremendous cost in money, privacy, national security, and reputation.
Keywords
Security Breach, Dark Web, ITRC, VPN, PLA, Ransomware, Phishing
References
[1] Lyttle, M. A., Walsh, S.D. (2015, March 20). Protecting your library against data breach. Retrieved May 23, 2018, from http://publiclibrariesonline.org/2015/03/protecting-your-library-against-a-data-breach/
[2] Library patrons in 10 western Wisconsin countries affected in data breach. Retrieved May 26, 2018, from http://www.week.com/story/36583282/2017/10/Thursday/alert-library-patrons-in-10-western-wisconsin-counties-affected-in-data-breach
[3] Armerding, T. (2018, January 26). The 17 biggest data breaches of the 21st century. Security practitioners weigh in on the 17 worst data breaches in recent memory. Retrieved May 24, 2018, from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html
[4] Gemalto. (2017). The year of internal threats and accidental data breaches. Retrieved May 27, 2018, from https://breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf
[5] Cyber scout. (2017). ITRC: 2017 Annual data breach year-end review Retrieved June 6, 2018, from https://www.idtheftcenter.org/images/breach/2017Breaches/2017AnnualDataBreachYearEndReview.pdf
[6] Maxfield, D. (2017, October 19). Technology & Data Security in Libraries: A Playbook for Managing today’s Imperative. Retrieved May 28, 2018, from http://www.governing.com/topics/education/technology–data-security-in-libraries-a-playbook-for-managing-todays-imperative.html
[7] Irwin, L. (2017, December 12). 7 tips for spotting a data breach. Retrieved June 2, 2018, from https://www.itgovernance.eu/blog/en/7-tips-for-spotting-a-data-breach
[8] Semantec. (2017). Internet security threat report. Mountain view, CA: Semantec Corporation, USA. Retrieved May 28, 2018, from https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf