Security resources organized by topic: Difference between revisions

From TCU Wiki
Line 40: Line 40:
[https://communitydocs.accessnow.org/ Access Now Help Desk documentation]
[https://communitydocs.accessnow.org/ Access Now Help Desk documentation]


More info:


more info:
[[Ways to securely store and share files|Secure storage for sensitive information]]


[[Ways to securely store and share files|Secure storage for sensitive information]]: <nowiki>https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files</nowiki>
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]]  


Secure access to sensitive information: <nowiki>https://wiki.digitalrights.community/index.php?title=Protect_your_accounts_using_strong_passwords,_pw_managers,_2fa</nowiki>
[[Secure your devices]] 


Secure your devices: <nowiki>https://wiki.digitalrights.community/index.php?title=Secure_your_devices</nowiki>
'''Threats to your information:'''
 
---
 
Threats to your information:


Data loss
Data loss
Line 67: Line 64:
Surveillance and monitoring
Surveillance and monitoring


---
'''Take steps to:'''
 
Take steps to:


Better understand the risks you face
Better understand the risks you face

Revision as of 03:48, 12 January 2024

[ 🚧 under construction]

Context analysis

How the internet works

Assessing risk

Analyzing threats

Producing security plans

Protect your devices

Protect yourself online

Protect your accounts using strong passwords, pw managers, 2fa - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts.

Safe internet browsing using VPN and Tor browser - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online.

Protect your information

Security considerations when travelling

General tips for international travel

Online harassment

How to deal with online harassment and threats

Assessment and planning tools

Compilations

Digital First Aid Kit

Access Now Help Desk documentation

More info:

Secure storage for sensitive information

Secure access to sensitive information

Secure your devices

Threats to your information:

Data loss

Compromised accounts

Device inspection at checkpoints

Device confiscation or theft

Information handover

Targeted malware

Surveillance and monitoring

Take steps to:

Better understand the risks you face

Maintain awareness of your environment

Set up safety contacts

Prepare family and co-workers in case the worst happens

Understand, organize and protect your information

Protect your communications

Protect your devices

Protect your accounts