Security resources organized by topic: Difference between revisions
From TCU Wiki
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
[ 🚧 under construction] | [ 🚧 under construction] | ||
== Context analysis == | |||
How the internet works | |||
== Assessing risk == | |||
== Analyzing threats == | |||
== Producing security plans == | |||
=== Protect your devices === | |||
[[Secure your devices]] - These resources will help you understand when to use full disk encryption and antivirus. | * [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware. | ||
* [[Secure your devices]] - These resources will help you understand when to use full disk encryption and antivirus. | |||
=== Protect yourself online === | |||
[[Protect your accounts using strong passwords, pw managers, 2fa]] - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts. | [[Protect your accounts using strong passwords, pw managers, 2fa]] - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts. | ||
Line 12: | Line 21: | ||
=== Protect your information === | === Protect your information === | ||
[[Tools for securely documenting human rights violations]] | * [[Ways to securely store and share files]] | ||
* [[Tools for securely documenting human rights violations]] | |||
* Protect your communication | |||
=== Online harassment === | |||
[[How to deal with online harassment and threats]] | |||
[[Assessment and planning tools]] | [[Assessment and planning tools]] |
Revision as of 12:07, 10 August 2023
[ 🚧 under construction]
Context analysis
How the internet works
Assessing risk
Analyzing threats
Producing security plans
Protect your devices
- How to mitigate your risk of being subject to Pegasus surveillance, and other spyware.
- Secure your devices - These resources will help you understand when to use full disk encryption and antivirus.
Protect yourself online
Protect your accounts using strong passwords, pw managers, 2fa - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts.
Safe internet browsing using VPN and Tor browser - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online.
Protect your information
- Ways to securely store and share files
- Tools for securely documenting human rights violations
- Protect your communication
Online harassment
How to deal with online harassment and threats