Chapter 1. Assessing Your Security and Privacy Needs

It seems that every day there is news of a security breach or invasion of privacy. From ransomware to widespread breaches of private data, the news is full of scare stories. Sometimes it feels like there is nothing that you as an ordinary citizen can do to protect your data—except to renounce all modern technologies and head to the hills!

Luckily, when it comes to the security of your personal and professional data, there are things you can do to reduce your risk. That’s what this report is about. You can learn to see beyond the hype of media scare stories and learn what’s worth paying attention to with advice from security experts.

In this report, we’ll discuss answers to these questions:

For each question, we’ll look at what security experts recommend for protecting your data. We’ll also discuss the difference between threats (all the bad things that can happen) and risks (the likelihood that each threat might happen). Understanding your risks will help you create an individualized security plan for the different types of data you work with every day since not all data needs the same level of protection. I’ll offer information on how to create such a plan for both your personal and your work-related data.

And finally, we’ll discuss why it’s important for everyone to practice good online security since what you do affects others. I’ll recommend a few simple steps for getting started since it can be overwhelming to consider all of this at once. I’ll end with some ideas for sharing this information with library users, along with a bibliography of resources to further your learning.

Which Advice to Trust

When reading about security threats, you’ll often come across scary headlines from blogs and news sites. It’s disheartening to see so many of these stories about security threats, especially when you are busy and don’t have time to learn about each risk and how it might affect you.

How do you know which advice to trust? When evaluating any security tool (such as a password manager app), I recommend looking at two sources: documentation from the vendor about its own security practices and reviews from independent security experts.

Here are some things to look for in the documentation provided with software that is designed to protect your data:

As for independent security experts, here are a few individuals and organizations worth following. They often write about the latest security and privacy issues on their blogs and for major media outlets:

Schneier on Security

https://www.schneier.com

Krebs on Security

https://krebsonsecurity.com

EFF

https://eff.org

EPIC

https://epic.org

When you see a scary headline about the latest security breach, it’s a good idea to look for commentary about it on the blogs of these experts. They will often bring a balanced view of what has happened and offer recommendations on what to do about it. Of course, there are other experts, but these are the ones I have found to be most consistently useful and trustworthy.

Building Your Threat Model

One piece of advice from the EFF that I have found very helpful is to build your own “threat model.”2 This is a plan you can create that helps you decide what level of security you will need for each different type of data you work with.

When working with data, EFF recommends you ask yourself the following questions:

  1. What do I want to protect?
  2. Who do I want to protect it from?
  3. How bad are the consequences if I fail?
  4. How likely is it that I will need to protect it?
  5. How much trouble am I willing to go through to try to prevent potential consequences?2

Threats are any potential harm to the security and privacy of your data. A risk, on the other hand, is the likelihood that a potential threat will happen. You’ll start to realize that for some of your data, the likelihood of something bad happening is small or the outcome of the worst-case scenario is not important to you. Since each kind of protection that you implement has a cost in lost time, money, or inconvenience, it’s a good idea to be selective about which of your collections of data need strong locks and which don’t. You already do the same in the physical world when deciding where to put locks or alarms and where not to.

As your situation changes over time, these risks and threats may also change. It’s a good idea to create a new threat model each calendar year.3

Notes

  1. Allen St. John, “Equifax Data Breach: What Consumers Need to Know,” Consumer Reports, September 21, 2017, https://www.consumerreports.org/privacy/what-consumers-need-to-know-about-the-equifax-data-breach/.
  2. For complete details, see the Electronic Frontier Foundation, “Assessing Your Risks,” Surveillance Self-Defense, last reviewed September 7, 2017, https://ssd.eff.org/en/module/assessing-your-risks.
  3. Ibid.