ဗမာဘာသာစကား (Burmese): Difference between revisions
No edit summary |
No edit summary |
||
(2 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
The Front Line Defenders '''''Workbook on Security''''' takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. | The Front Line Defenders '''''Workbook on Security''''' takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. | ||
[https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_1_bu.pdf အခန်း ၁ မိတ်ဆက်] (Chapter 1: Introduction) | * [https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_1_bu.pdf အခန်း ၁ မိတ်ဆက်] (Chapter 1: Introduction) | ||
* [https://www.frontlinedefenders.org/my/%E1%80%9C%E1%80%AF%E1%80%B6%E1%80%81%E1%80%BC%E1%80%AF%E1%80%B6%E1%80%9B%E1%80%B1%E1%80%B8%E1%80%94%E1%80%BE%E1%80%84%E1%80%B7%E1%80%BA%E1%80%86%E1%80%AD%E1%80%AF%E1%80%84%E1%80%BA%E1%80%9E%E1%80%B1%E1%80%AC%E1%80%85%E1%80%AC%E1%80%A1%E1%80%AF%E1%80%95%E1%80%BA အခန်း ၂ အန္တရာယ်အကဲဖြတ်ခြင်း။] (Chapter 2: Assessing Risk) | |||
[https://www.frontlinedefenders.org/my/%E1%80%9C%E1%80%AF%E1%80%B6%E1%80%81%E1%80%BC%E1%80%AF%E1%80%B6%E1%80%9B%E1%80%B1%E1%80%B8%E1%80%94%E1%80%BE%E1%80%84%E1%80%B7%E1%80%BA%E1%80%86%E1%80%AD%E1%80%AF%E1%80%84%E1%80%BA%E1%80%9E%E1%80%B1%E1%80%AC%E1%80%85%E1%80%AC%E1%80%A1%E1%80%AF%E1%80%95%E1%80%BA အခန်း ၂ အန္တရာယ်အကဲဖြတ်ခြင်း။] (Chapter 2: Assessing Risk) | * [https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_3_bu.pdf အခန်း ၃ ခြိမ်းခြောက်မှုများကို ဆန်းစစ်ခြင်း။] (Chapter 3: Analysing Threats) | ||
* [https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_4_bu.pdf အခန်း ၄ သုခချမ်းသာ] (Chapter 4: Well-Being) | |||
[https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_3_bu.pdf အခန်း ၃ ခြိမ်းခြောက်မှုများကို ဆန်းစစ်ခြင်း။] (Chapter 3: Analysing Threats) | * [https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_5_bu.pdf အခန်း ၅ လုံခြုံရေးအစီအစဉ်များ ဖန်တီးခြင်း။] (Chapter 5: Creating Security Plans) | ||
* [https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_6_bu.pdf အခန်း ၆ စကားစပ်] (Chapter 6: Context) | |||
[https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_4_bu.pdf အခန်း ၄ သုခချမ်းသာ] (Chapter 4: Well-Being) | * [https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_1_bu.pdf နောက်ဆက်တွဲ ၁ SWOT လုံခြုံရေး ခွဲခြမ်းစိတ်ဖြာခြင်း။] (Appendix 1: SWOT Security Analysis) | ||
* [https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_2_bu.pdf အူအတက် ၂ အကြောင်းအရာခွဲခြမ်းစိတ်ဖြာခြင်းမေးခွန်းများ] (Appendix 2: Context Analysis Questions) | |||
[https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_5_bu.pdf အခန်း ၅ လုံခြုံရေးအစီအစဉ်များ ဖန်တီးခြင်း။] (Chapter 5: Creating Security Plans) | * [https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_3_bu.pdf အူအတက် ၃ အန္တရာယ်ခွဲခြမ်းစိတ်ဖြာခြင်း Visual Format] (Appendix 3: Risk Analysis Visual Format) | ||
* [https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_4_bu.pdf နောက်ဆက်တွဲ ၄ လူ့အခွင့်အရေး ကာကွယ်စောင့်ရှောက်သူများ၏ စွမ်းဆောင်ရည်] (Appendix 4: Capacities for HRDs) | |||
[https://www.frontlinedefenders.org/sites/default/files/workbook_chapter_6_bu.pdf အခန်း ၆ စကားစပ်] (Chapter 6: Context) | * [https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_5_bu.pdf အူအတက် ၅ ရုံးလုံခြုံရေး] (Appendix 5: Office Security) | ||
* [https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_6_bu.pdf အူအတက် ၆ အိမ်လုံခြုံရေး] (Appendix 6: Home Security) | |||
[https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_1_bu.pdf နောက်ဆက်တွဲ ၁ SWOT လုံခြုံရေး ခွဲခြမ်းစိတ်ဖြာခြင်း။] (Appendix 1: SWOT Security Analysis) | * [https://www.frontlinedefenders.org/sites/default/files/workbook_appendix_7_bu.pdf အူအတက် ၇ သူတစ်ပါးကို အကာအကွယ်ပေးခြင်း] (Appendix 7: Protection of Others) | ||
* နောက်ဆက်တွဲ ၈ (Appendix 8: Demonstrations) | |||
အူအတက် ၂ အကြောင်းအရာခွဲခြမ်းစိတ်ဖြာခြင်းမေးခွန်းများ (Appendix 2: Context Analysis Questions) | * နောက်ဆက်တွဲ ၉ (Appendix 9: Detention / Arrest / Kidnap) | ||
* နောက်ဆက်တွဲ ၁၀ (Appendix 10: Assault / Sexual Assault) | |||
အူအတက် ၃ (Appendix 3: Risk Analysis Visual Format) | * နောက်ဆက်တွဲ ၁၁ (Appendix 11: Travelling - Rural Areas) | ||
* နောက်ဆက်တွဲ ၁၂ (Appendix 12: Administrative Measures) | |||
နောက်ဆက်တွဲ ၄ (Appendix 4: Capacities for HRDs) | * နောက်ဆက်တွဲ ၁၃ (Appendix 13: Defamation) | ||
* နောက်ဆက်တွဲ ၁၄ (Appendix 14: Basic Computer / Phone Security) | |||
အူအတက် ၅ (Appendix 5: Office Security) | * နောက်ဆက်တွဲ ၁၅ (Appendix 15: Surveillance) | ||
* နောက်ဆက်တွဲ ၁၆ (Appendix 16: Overcoming Resistance to Security Strategies) | |||
အူအတက် ၆ (Appendix 6: Home Security) | * နောက်ဆက်တွဲ ၁၇ (Appendix 17: Supportive Organisations for HRDs) | ||
အူအတက် ၇ (Appendix 7: Protection of Others) | |||
နောက်ဆက်တွဲ ၈ (Appendix 8: Demonstrations) | |||
နောက်ဆက်တွဲ ၉ (Appendix 9: Detention / Arrest / Kidnap) | |||
နောက်ဆက်တွဲ ၁၀ (Appendix 10: Assault / Sexual Assault) | |||
နောက်ဆက်တွဲ ၁၁ (Appendix 11: Travelling - Rural Areas) | |||
နောက်ဆက်တွဲ ၁၂ (Appendix 12: Administrative Measures) | |||
နောက်ဆက်တွဲ ၁၃ (Appendix 13: Defamation) | |||
နောက်ဆက်တွဲ ၁၄ (Appendix 14: Basic Computer / Phone Security) | |||
နောက်ဆက်တွဲ ၁၅ (Appendix 15: Surveillance) | |||
နောက်ဆက်တွဲ ၁၆ (Appendix 16: Overcoming Resistance to Security Strategies) | |||
နောက်ဆက်တွဲ ၁၇ (Appendix 17: Supportive Organisations for HRDs) | |||
[https://www.frontlinedefenders.org/my/%E1%80%9C%E1%80%AF%E1%80%B6%E1%80%81%E1%80%BC%E1%80%AF%E1%80%B6%E1%80%9B%E1%80%B1%E1%80%B8%E1%80%94%E1%80%BE%E1%80%84%E1%80%B7%E1%80%BA%E1%80%86%E1%80%AD%E1%80%AF%E1%80%84%E1%80%BA%E1%80%9E%E1%80%B1%E1%80%AC%E1%80%85%E1%80%AC%E1%80%A1%E1%80%AF%E1%80%95%E1%80%BA လုံခြုံရေးဆိုင်ရာ အလုပ်စာအုပ်ကို မြန်မာလို ကြည့်ပါ။] >> | [https://www.frontlinedefenders.org/my/%E1%80%9C%E1%80%AF%E1%80%B6%E1%80%81%E1%80%BC%E1%80%AF%E1%80%B6%E1%80%9B%E1%80%B1%E1%80%B8%E1%80%94%E1%80%BE%E1%80%84%E1%80%B7%E1%80%BA%E1%80%86%E1%80%AD%E1%80%AF%E1%80%84%E1%80%BA%E1%80%9E%E1%80%B1%E1%80%AC%E1%80%85%E1%80%AC%E1%80%A1%E1%80%AF%E1%80%95%E1%80%BA လုံခြုံရေးဆိုင်ရာ အလုပ်စာအုပ်ကို မြန်မာလို ကြည့်ပါ။] >> | ||
Line 81: | Line 57: | ||
Further learning: | Further learning: | ||
.... | |||
[https://ssd.eff.org/my Link to full collection of guides available in Burmese >>] | [https://ssd.eff.org/my Link to full collection of guides available in Burmese >>] | ||
Security in a Box | === Security in a Box === | ||
https://securityinabox.org/my/ -- Security in a Box | |||
https:// | Security in a Box is a project of Front Line Defenders It was created in 2007 in collaboration with Tactical Technology Collective, and significantly overhauled by Front Line Defenders in 2021. Security in a Box primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy. | ||
=== Safe Sisters Guide === | |||
This booklet is meant to help our sisters learn about problems that we might run into on the internet (like leaked or stolen photos, viruses, and scams), how we can make informed decisions every day to protect ourselves, and to make the internet a safe space for ourselves, our families, and all women! Our mission is make digital security less complicated and more relevant to real users and to encourage all women and girls to take online safety into their own hands. We hope this booklet will help readers see that the most effective ways to protect yourself online are common sense strategies we already use offline every day. This guide is available for download in Burmese. https://safesisters.net/resources/ | |||
https:// | === Risk Mitigation and Management Guide === | ||
https://drive.google.com/file/d/1sTuOjE-HUCHEQlcNHMdWicbD0yu9Nzbb/view | |||
https:// | === Myanmar Protesters’ Toolkit === | ||
The [https://freeexpressionmyanmar.org/wp-content/uploads/2021/02/myanmar-protesters-toolkit.pdf Myanmar Protesters’ Toolkit] empowers people with the knowledge necessary to freely exercise their right to protest. The Toolkit includes guidance on: 1) relevant international and national laws; 2) trends in Myanmar; 3) your rights and options when detained, arrested, or charged. Each page is written in Myanma but repeated in English to enable you to research further and communicate with different audiences too. | |||
No longer available: | |||
https://digitalteahouse.info/ Promotes digital safety awareness in Myanmar. Has a podcast and materials for trainers | * https://bubbles.sevensnails.com/Guides_Tips_Readings/ A Burmese-language directory of downloads including tool kits, information on safely documenting events on video, and information for protesters. | ||
* https://digitalteahouse.info/ Promotes digital safety awareness in Myanmar. Has a podcast and materials for trainers |
Latest revision as of 20:17, 26 January 2024
မြန်မာလို Holistic Security and Digital Security Resources
လုံခြုံရေးနှင့်ဆိုင်သောစာအုပ် (Workbook on Security)
The Front Line Defenders Workbook on Security takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics.
- အခန်း ၁ မိတ်ဆက် (Chapter 1: Introduction)
- အခန်း ၂ အန္တရာယ်အကဲဖြတ်ခြင်း။ (Chapter 2: Assessing Risk)
- အခန်း ၃ ခြိမ်းခြောက်မှုများကို ဆန်းစစ်ခြင်း။ (Chapter 3: Analysing Threats)
- အခန်း ၄ သုခချမ်းသာ (Chapter 4: Well-Being)
- အခန်း ၅ လုံခြုံရေးအစီအစဉ်များ ဖန်တီးခြင်း။ (Chapter 5: Creating Security Plans)
- အခန်း ၆ စကားစပ် (Chapter 6: Context)
- နောက်ဆက်တွဲ ၁ SWOT လုံခြုံရေး ခွဲခြမ်းစိတ်ဖြာခြင်း။ (Appendix 1: SWOT Security Analysis)
- အူအတက် ၂ အကြောင်းအရာခွဲခြမ်းစိတ်ဖြာခြင်းမေးခွန်းများ (Appendix 2: Context Analysis Questions)
- အူအတက် ၃ အန္တရာယ်ခွဲခြမ်းစိတ်ဖြာခြင်း Visual Format (Appendix 3: Risk Analysis Visual Format)
- နောက်ဆက်တွဲ ၄ လူ့အခွင့်အရေး ကာကွယ်စောင့်ရှောက်သူများ၏ စွမ်းဆောင်ရည် (Appendix 4: Capacities for HRDs)
- အူအတက် ၅ ရုံးလုံခြုံရေး (Appendix 5: Office Security)
- အူအတက် ၆ အိမ်လုံခြုံရေး (Appendix 6: Home Security)
- အူအတက် ၇ သူတစ်ပါးကို အကာအကွယ်ပေးခြင်း (Appendix 7: Protection of Others)
- နောက်ဆက်တွဲ ၈ (Appendix 8: Demonstrations)
- နောက်ဆက်တွဲ ၉ (Appendix 9: Detention / Arrest / Kidnap)
- နောက်ဆက်တွဲ ၁၀ (Appendix 10: Assault / Sexual Assault)
- နောက်ဆက်တွဲ ၁၁ (Appendix 11: Travelling - Rural Areas)
- နောက်ဆက်တွဲ ၁၂ (Appendix 12: Administrative Measures)
- နောက်ဆက်တွဲ ၁၃ (Appendix 13: Defamation)
- နောက်ဆက်တွဲ ၁၄ (Appendix 14: Basic Computer / Phone Security)
- နောက်ဆက်တွဲ ၁၅ (Appendix 15: Surveillance)
- နောက်ဆက်တွဲ ၁၆ (Appendix 16: Overcoming Resistance to Security Strategies)
- နောက်ဆက်တွဲ ၁၇ (Appendix 17: Supportive Organisations for HRDs)
လုံခြုံရေးဆိုင်ရာ အလုပ်စာအုပ်ကို မြန်မာလို ကြည့်ပါ။ >>
ထောက်လှမ်းရေးလမ်းညွှန် (Surveillance Self Defense Guide)
The Electronic Frontier Foundation is an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: expert guide to protecting you and your friends from online spying. This guide contains tips, tools and how-tos for safer online communications. Below are specific guides available in Burmese.
Basics:
- ကုဒ်ဖြင့်ပြောင်းလဲခြင်းနဲ့ပတ်သက်လို့ ဘာတွေသိထားသင့်သလဲ။ (what I should know about encryption)
- ခိုင်ခံ့သောစကားဝှက်များ ဖန်တီးထားရှိခြင်း (creating strong passwords)
- ဒစ်ဂျစ်တယ်လုံခြုံရေးအစီအစဉ် (your security plan)
- ဒစ်ဂျစ်တယ်လုံခြုံရေးအတွက် ဆောင်ရွက်ရန်အဆင့်ခုနှစ်ဆင့် (seven steps to digital security)
- မိမိ၏အချက်အလက်များကို လုံခြုံစွာ သိမ်းဆည်းခြင်း (keeping your data safe)
- အချက်အလက်အကြောင်းရှင်းပြသည့်အချက်အလက် သို့မဟုတ် metadata တွေဟာ ဘာကြောင့် အရေးကြီးသလဲ။ (why metadata matters)
- အခြားသူများနှင့် ဆက်သွယ်ဆောင်ရွက်ခြင်း (communicating with others)
- အသုံးပြုရန်နည်းပညာများရွေးချယ်ခြင်း (choosing your tools)
Tool guides:
- KeePassXC ကိုဘယ်လိုသုံးမလဲ (how to use KeePassXC)
- iPhone အားကုဒ်ဖြင့်ပြောင်းလဲခြင်းလုပ်ဆောင်နည်း (how to encrypt your iPhone)
- ဖစ်ရှင်းနည်းလမ်းနဲ့ တိုက်ခိုက်မှုတွေကို ဘယ်လိုရှောင်ရှားမလဲ (how to avoid phishing attacks)
- အဆင့်နှစ်ဆင့်ဖြင့် စစ်မှန်ကြောင်းသက်သေပြခြင်းကိုဘယ်လိုလုပ်ဆောင်မလဲ (how to enable two factor authentication)
- Linux စနစ်အတွက် Tor အသုံးပြုနည်းလမ်းညွှန် (how to use Tor for Linux)
- Windows စနစ်တွင် Tor ဘရောက်ဇာကို အသုံးပြုခြင်း (how to use Tor for Windows)
- Linux ကွန်ပျူတာစနစ်အသုံးပြုသူများအတွက် အချက်အလက်များ လုံခြုံစွာဖျက်နည်းလမ်းညွှန် (how to delete your data securely for Linux)
- macOS ကွန်ပျူတာစနစ်အသုံးပြုသူများအတွက် အချက်အလက်များ လုံခြုံစွာဖျက်နည်းလမ်းညွှန် (how to delete your data securely for MacOS)
- လမ်းညွှန် - Windows စနစ်တွင် အချက်အလက်များကို လုံခြုံစွာဖျက်ခြင်း (how to delete your data securely for Windows)
Further learning:
....
Link to full collection of guides available in Burmese >>
Security in a Box
https://securityinabox.org/my/ -- Security in a Box
Security in a Box is a project of Front Line Defenders It was created in 2007 in collaboration with Tactical Technology Collective, and significantly overhauled by Front Line Defenders in 2021. Security in a Box primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.
Safe Sisters Guide
This booklet is meant to help our sisters learn about problems that we might run into on the internet (like leaked or stolen photos, viruses, and scams), how we can make informed decisions every day to protect ourselves, and to make the internet a safe space for ourselves, our families, and all women! Our mission is make digital security less complicated and more relevant to real users and to encourage all women and girls to take online safety into their own hands. We hope this booklet will help readers see that the most effective ways to protect yourself online are common sense strategies we already use offline every day. This guide is available for download in Burmese. https://safesisters.net/resources/
Risk Mitigation and Management Guide
https://drive.google.com/file/d/1sTuOjE-HUCHEQlcNHMdWicbD0yu9Nzbb/view
Myanmar Protesters’ Toolkit
The Myanmar Protesters’ Toolkit empowers people with the knowledge necessary to freely exercise their right to protest. The Toolkit includes guidance on: 1) relevant international and national laws; 2) trends in Myanmar; 3) your rights and options when detained, arrested, or charged. Each page is written in Myanma but repeated in English to enable you to research further and communicate with different audiences too.
No longer available:
- https://bubbles.sevensnails.com/Guides_Tips_Readings/ A Burmese-language directory of downloads including tool kits, information on safely documenting events on video, and information for protesters.
- https://digitalteahouse.info/ Promotes digital safety awareness in Myanmar. Has a podcast and materials for trainers