Information Security in Digital Preservation
News of Internet insecurity are lowering user’s trust in Internet based service, including digital libraries (Kuzma, 2010). Information security is a big issue in digital preservation. Information security issues can be generally divided into three categories: (1) system security, (2) collection security and (3) the legal and regulatory aspects. System security means preventing the information infrastructure; Collection security refers to no loss or change of the content; Legal and regulatory aspects address personal or confidential information related in the digital items and services (Digital Preservation Coalition, n.d.). So, what else can digital librarians do to weaken the risks of information security in digital preservation?
First, System security is the basic requirement for digital libraries surviving. Both hardware and online platform holding the digital resources should be secure enough to make sure the long-term preservation and protecting items from attacks or loss. I had a sad story on preserving items on the Internet. I used to have a blog which I used as a personal information infrastructure. I wrote diaries and saved most of my photos on it. After I went to college, I seldom used the blog. Five years ago, I found that my blog disappeared. This blog website was obsolete. The owner company decided to close the website. I lost all my stuff preserved on it!!! That was why I said digital preservation is by no means safer than physical preservation in my first blog. Therefore, choosing a reliable information infrastructure is extremely important. In addition, digital librarians can do regular data preservation and backups to against data loss (Anday et al., 2012).
Second, access control is critical to ensure collection security. The NDSA levels guidelines on information security touch this point directly. In the first level, recognize who has read, write, move and delete authorization to individual files and restrict who has those authorizations to each file. In the second level, write down access restrictions for content. In the third level, maintain logs of who performed what actions on files, including deletions and preservation actions. In the fourth level, perform audit of logs (Phillips, 2013). In the process of digital preservation, the administrator set up the access control in the infrastructure system, and digital librarians log into the system with limited authorization. This is a good way to clarify responsibility and avoid mistakes that may threaten content security. Another important method to protect collection security is identification and authentication of users. Users of digital libraries can be asked to register an account with an authentic ID and log into the websites before they use resources. This can protect digital items from unauthorized access. For example, digital librarians can set up that some digital items holding confidential information are inaccessible for unauthorized users.
In conclusion, in order to protecting system security, digital libraries and librarians should choose hardware and online platform with good quality and at the same time remember to do regular data preservation and backups. Also, authoritative access control in the process of creating and managing the data and information and identification of users are good ways to protect collection security. In addition, digital libraries should ensure conformity with any legal and regulatory requirements to decrease and avoid legal and regulatory issues.
Anday, A., Francese, E., Huurdeman, H. C., Yilmaz, M., & Zengenene, D. (2012). Information Security Issues in a Digital Library Environment: A literature Review. Bilgi Dünyası, 13(1), 117-137.
Digital Preservation Coalition. (N.D.) Digital Preservation Handbook. Retrieved from: https://www.dpconline.org/handbook/technical-solutions-and-tools/information-security
Kuzma, J. (2010). European Digital Libraries: Web Security Vulnerabilities. Library Hi Tech, 28(3), 402-413.
Phillips, M.P. (2013). The NDSA Levels of Digital Preservation: An Explanation and Uses.