Security resources organized by topic: Difference between revisions
(→Producing security plans: created page for travel tips) |
|||
Line 33: | Line 33: | ||
[[How to deal with online harassment and threats]] | [[How to deal with online harassment and threats]] | ||
[https://securityplanner.consumerreports.org/ Assessment and planning tools] | |||
=== Compilations === | === Compilations === | ||
Line 45: | Line 43: | ||
more info: | more info: | ||
Secure storage for sensitive information: <nowiki>https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files</nowiki> | [[Ways to securely store and share files|Secure storage for sensitive information]]: <nowiki>https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files</nowiki> | ||
Secure access to sensitive information: <nowiki>https://wiki.digitalrights.community/index.php?title=Protect_your_accounts_using_strong_passwords,_pw_managers,_2fa</nowiki> | Secure access to sensitive information: <nowiki>https://wiki.digitalrights.community/index.php?title=Protect_your_accounts_using_strong_passwords,_pw_managers,_2fa</nowiki> |
Revision as of 03:46, 12 January 2024
[ 🚧 under construction]
Context analysis
How the internet works
Assessing risk
Analyzing threats
Producing security plans
Protect your devices
- How to mitigate your risk of being subject to Pegasus surveillance, and other spyware.
- Secure your devices - These resources will help you understand when to use full disk encryption and antivirus.
Protect yourself online
Protect your accounts using strong passwords, pw managers, 2fa - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts.
Safe internet browsing using VPN and Tor browser - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online.
Protect your information
- Information Security for Human Rights Defenders
- Ways to securely store and share files
- Tools for securely documenting human rights violations
- Protect your communication
Security considerations when travelling
General tips for international travel
Online harassment
How to deal with online harassment and threats
Compilations
Access Now Help Desk documentation
more info:
Secure storage for sensitive information: https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files
Secure access to sensitive information: https://wiki.digitalrights.community/index.php?title=Protect_your_accounts_using_strong_passwords,_pw_managers,_2fa
Secure your devices: https://wiki.digitalrights.community/index.php?title=Secure_your_devices
---
Threats to your information:
Data loss
Compromised accounts
Device inspection at checkpoints
Device confiscation or theft
Information handover
Targeted malware
Surveillance and monitoring
---
Take steps to:
Better understand the risks you face
Maintain awareness of your environment
Set up safety contacts
Prepare family and co-workers in case the worst happens
Understand, organize and protect your information
Protect your communications
Protect your devices
Protect your accounts