Cornell University Library

Digital Scholarship Guides

Research Security

Threat Modelling

  • What do you have to protect?
  • Who do you have to protect it from?
  • How likely is it that you will need to protect it?
  • What are the consequences if you fail?
  • How much hassle are you willing to go through to prevent those consequences?

Remember that …

  • No one tool or software is a panacea against every security threat. All tools have strengths and weaknesses, and their effectiveness depends on how you use them and whether it’s the right tool for a given threat.
  • You don’t have to do everything in order to increase your safety and security. Don’t fall prey to overwhelm. Small steps help.
  • We are here to help! Bring your questions and your particular situation to us at cul-privacy@cornell.edu

Encrypted Communication with Research Subjects and Collaborators

Instant Messaging

Collaborative Writing on Shared Documents

Email

Storing and Moving Files

  • The shared drive software options listed above are all options for encrypted cloud storage. A search will reveal additional encrypted cloud drives as well. In addition, depending on your threat model and use case, consider physical thumb drives or hard drives for back up and/or long-term storage. Inexpensive, and you don’t have to worry you’ll forget to pay the monthly subscription fee.

on this page