Muutke küpsiste eelistusi

Securing Library Technology: A How-to-do-it Manual [Pehme köide]

  • Formaat: Paperback / softback, 245 pages, kõrgus x laius: 279x216 mm, kaal: 748 g, Illustrations
  • Sari: How-to-do-it Manuals No. 162
  • Ilmumisaeg: 01-Jan-2009
  • Kirjastus: Neal-Schuman Publishers Inc
  • ISBN-10: 1555706398
  • ISBN-13: 9781555706395
  • Formaat: Paperback / softback, 245 pages, kõrgus x laius: 279x216 mm, kaal: 748 g, Illustrations
  • Sari: How-to-do-it Manuals No. 162
  • Ilmumisaeg: 01-Jan-2009
  • Kirjastus: Neal-Schuman Publishers Inc
  • ISBN-10: 1555706398
  • ISBN-13: 9781555706395
This is a worst-case survival handbook for protecting your library's valuable technology assets.A must-have preparedness handbook for every library and information center, this non-technical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats - from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats.Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan.The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide.
List of Illustrations
ix
Preface xiii
Exploring Library Technology
1(14)
Common Technologies in Libraries
1(5)
Integrated Library Systems
1(2)
Office Systems
3(2)
Public Systems
5(1)
Computer Security and Access
6(5)
Basic Security Considerations for Desktop/Laptop Computers
7(1)
Network Basics
8(3)
Review Questions
11(1)
Key Points and Conclusion
12(1)
Readings and Resources
13(2)
Examining Library Security Principles
15(6)
Understanding Library Security
15(1)
Implementing Library Security
16(2)
Security Principles and Inventory
16(1)
Security Principles and Policies
17(1)
Policy Implementation and Enforcement
17(1)
Access-level, Physical-level, and Software-level Security
18(1)
Review Questions
19(1)
Key Points and Conclusion
19(1)
Readings and Resources
20(1)
Performing a Technology Inventory
21(10)
Beginning the Inventory: What Should Be Recorded?
21(2)
Media Access Control Addresses
22(1)
Compiling a Comprehensive Technology Inventory
23(6)
Review Questions
29(1)
Key Points and Conclusion
29(1)
Readings and Resources
30(1)
Creating a Network Security Policy
31(42)
Building a Written Policy for Library Security
31(1)
Classifying Information
32(2)
Classification of Information
32(2)
Server Policy
34(13)
Location and Access
35(2)
Server Administrators
37(3)
Backups and Restore
40(3)
Security Patches and Software Upgrades
43(1)
Authority and Responsibility Delegation
43(1)
Personnel Additions, Departures, and Terminations
44(3)
Staff Technology Policy: Desktops, Laptops, Printers
47(6)
Technology Security Leader
48(1)
Appropriate Computer Use
49(1)
Staff Computers
50(1)
Staff Laptops
50(1)
Printers
51(2)
Public Technology Policy: Desktops, Laptops, Printers
53(4)
Definition of Valid Patron or User
53(1)
Patron Rights
54(1)
Patron Agreement
54(1)
Proper Use of Technology
55(1)
Personally Owned Computers/Laptops/Wireless Products
56(1)
Printing
56(1)
Sanctions
56(1)
Network Policy: Routers, Firewalls, Switches, Wireless Access, Monitoring Software/Appliances
57(13)
Network Policy
62(1)
Network Health Tools
62(1)
Routers
62(1)
Firewalls
63(1)
Switches
63(2)
Wireless Access
65(1)
Inappropriate Employee or Patron Conduct
66(1)
Criminal Activity
67(1)
Official Law Enforcement Investigation
67(3)
Review Questions
70(1)
Key Points and Conclusion
70(3)
Understanding Threats from Hackers and Malcontents
73(26)
Hackers 101
73(1)
A History of Hacking
74(3)
1960s: The Dawn of Hackers
74(1)
1970s: Innovation and Creativity
75(1)
1980s: Hacker Clubs and Movies
75(1)
1990s: Raids and Arrests
76(1)
Hackers of the Twenty-first Century
77(1)
Hacker Mind-set
77(1)
Hacker Attack Modes
78(3)
Additional Hacker Methodology
80(1)
Network Infrastructure Vulnerabilities
81(7)
Hacker Methods and Tools
81(2)
Wireless Local Area Networks
83(1)
Operating Systems Hacks
84(1)
Vulnerabilities of Other Operating Systems
85(1)
Netware Vulnerabilities
86(1)
Application Hacks: E-mail, Instant Messaging, and Voice-over Internet Protocol
86(1)
Vulnerabilities of Web Servers
87(1)
Viruses
88(5)
Virus History
89(1)
Current Top Virus Threats
90(3)
Spyware
93(3)
Spyware History
94(1)
Types of Spyware
94(2)
Review Questions
96(1)
Key Points and Conclusion
96(1)
Readings and Resources
97(2)
Planning for Security Implementation and Auditing Weaknesses
99(16)
Determining Security Needs
104(1)
Security Audit: Finding Security Weaknesses
104(1)
Security Audit Tools and Techniques
105(6)
Port Scanners
105(3)
Vulnerability Scanners
108(1)
Application Scanners
109(1)
Web Application Assessment Proxy
110(1)
Security Procedure Audit
110(1)
Building a Plan to Implement the Audit
111(2)
Review Questions
113(1)
Key Points and Conclusion
114(1)
Readings and Resources
114(1)
Implementing Policies for Secure Public Technology
115(14)
Background for a Sound Security Foundation
115(2)
Library Security Profile and Checklist
116(1)
Public Access Computing Policies
117(2)
Usage Policies
117(1)
Public Access Security for Patron Laptops
118(1)
Phishing
119(2)
Link Manipulation
119(1)
Phone Phishing
119(1)
Web Site Forgery
119(1)
Software for Phishing Protection
120(1)
Protecting Patron Privacy with Library Technology
121(2)
Internet Temporary Files
122(1)
Browser History
122(1)
Cookies
122(1)
Form Memory
122(1)
Public Access Security Solutions
123(4)
Microsoft Windows SteadyState
123(1)
Deep Freeze
124(2)
Thin Clients
126(1)
Review Questions
127(1)
Key Points and Conclusion
127(1)
Readings and Resources
128(1)
Developing Security for Library Office Technology
129(14)
Securing Staff Computers: Best Practices
129(6)
Provide Security Training for Staff
129(2)
Monitor Computer Abuse by Library Staff
131(1)
Provide Employee Compliance Checks
132(1)
Choose Secure Passwords
132(1)
Emphasize Safe Internet Browsing Habits
133(1)
Back Up Data
133(1)
Keep the Computer Up to Date with Patches
134(1)
Antivirus Solutions
135(3)
Best Practices
135(2)
Antivirus Software
137(1)
Antispyware Solutions
138(3)
Best Practices
139(1)
Antispyware Software
139(2)
Review Questions
141(1)
Key Points and Conclusion
141(1)
Readings and Resources
142(1)
Establishing Server Security
143(24)
Understanding Servers and How They Work
143(2)
Web Servers
145(3)
Securing the Web Server
146(1)
HTTPS: Secure Web Servers
147(1)
FTP: File Transfer Protocol
147(1)
SMTP Service
148(1)
Microsoft Domain Controllers and Active Directory
148(10)
Domain Controllers
149(6)
Active Directory
155(2)
NIS Servers
157(1)
Conclusions
158(1)
Domain Name System
158(1)
Exchange Server; E-mail/Calendar Servers
159(1)
Microsoft Exchange Server
160(1)
Terminal Servers
160(4)
Review Questions
164(1)
Key Points and Conclusion
164(1)
Readings and Resources
165(2)
Securing the Library Network from External Threats
167(22)
Access to the Internet: A Brief Review
167(2)
Using Firewalls for External Protection
169(10)
Firewalls and Data Transmission
169(2)
Ethernet
171(3)
Specifications for Firewall Location
174(1)
Obtaining and Configuring the Firewall
174(5)
Local Computer-level Protections from Internet Threats
179(1)
Firewall Software
180(6)
Windows XP
180(6)
Linux, Red Hat, and Other Flavors of Operating Systems
186(1)
Review Questions
186(1)
Key Points and Conclusion
187(1)
Readings and Resources
188(1)
Securing the Library Network from Internal Threats
189(16)
LAN Design and Configuration
189(5)
Wireless Access Points and Wireless Security
194(4)
Wired Equivalent Privacy
194(1)
Using Routers for Internal Protection
195(2)
Using Firewalls for Internal Protection
197(1)
Public Access Systems: Securing Workstations
198(1)
Protecting the Internal Network from Patron Laptops
199(1)
Securing Staff Systems from Internal Threats
200(3)
Security Considerations for Staff Laptops
202(1)
Review Questions
203(1)
Key Points and Conclusion
204(1)
Appendix A. Links to State Laws on Cyber or Computer Crime 205(6)
Appendix B. Vendor or Software Web Sites 211(2)
Glossary 213(24)
Index 237(8)
About the Authors 245