WELCOME
WELCOME
LIBRARIES & CYBER SECURITY
Kevin MartinDec 2014
CYBERSECURITY & THE DIGITAL COMMONS
CULTIVATING AWARENESS
ALA CYBER SECURITY
LISSAM
VULNERABILITIES AND ATTACKS
• Passwords• Social Engineering• Device Management• Obsolescence
SOCIAL AND LEGAL RESPONSIBILITY
IMPLEMENTING POLICY
CONCLUSION
REFERENCESSlide 2 Image credit http://www.pinterest.com/pin/213428469816601326/
Slide 3 Image credit https://www.flickr.com/photos/makaylalewis/
Slide 4 Image credit https://www.flickr.com/photos/occupy/
Slide 5 Image credit: edited screen capture by author
Slide 6 Image credit: USIM PR department http://www.usim.edu.my/enEdited screen capture by author from Google Academic
Slide 7 Image credit https://www.flickr.com/photos/ttc_press/5088486967
Slide 8 Image credit https://www.flickr.com/photos/talba/2828082413
Slide 9 Image Credit: https://www.flickr.com/photos/anthonyalbright/4650945716
Slide 10 Image credit: https://www.flickr.com/photos/quinnanya/3048578677