Security resources organized by topic: Difference between revisions

From TCU Wiki
No edit summary
Line 5: Line 5:


== Assessing risk ==
== Assessing risk ==
Security Planner: [https://securityplanner.consumerreports.org/ Assessment and planning tools]


== Analyzing threats ==
== Analyzing threats ==
Threats to your information:


== Producing security plans ==
* Data loss
* Compromised accounts
* Device inspection at checkpoints
* Device confiscation or theft
* Information handover
* Targeted malware
* Surveillance and monitoring
 
== Determine mitigation measures ==


=== Protect your devices ===
=== Protect your devices ===
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware.
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware.
* [[Secure your devices]] - These resources will help you understand when to use full disk encryption and antivirus.
* [[Secure your devices]] - These resources will help you understand when to use full disk encryption and antivirus.
Line 27: Line 36:
* Protect your communication
* Protect your communication
* [[Protect your website]]
* [[Protect your website]]
=== Online harassment ===
[[How to deal with online harassment and threats]]
== Producing security plans ==
[[General guidance for creating security plans and agreements]]


=== Security considerations when travelling ===
=== Security considerations when travelling ===
[[General tips for international travel]]
[[General tips for international travel]]


=== Online harassment ===
[[How to deal with online harassment and threats]]


[https://securityplanner.consumerreports.org/ Assessment and planning tools]
== Resource collections ==
[https://digitalfirstaid.org/ Digital First Aid Kit] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.
 
[https://communitydocs.accessnow.org/ Access Now Help Desk documentation]


=== Compilations ===
[https://digitalfirstaid.org/ Digital First Aid Kit]


The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.


[https://communitydocs.accessnow.org/ Access Now Help Desk documentation]


More info:
More info:
Line 49: Line 61:
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]]  
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]]  


[[Secure your devices]]
[[Secure your devices]]
 
'''Threats to your information:'''
 
Data loss
 
Compromised accounts
 
Device inspection at checkpoints
 
Device confiscation or theft
 
Information handover
 
Targeted malware
 
Surveillance and monitoring
 
'''Take steps to:'''
 
Better understand the risks you face
 
Maintain awareness of your environment
 
Set up safety contacts
 
Prepare family and co-workers in case the worst happens
 
Understand, organize and protect your information
 
Protect your communications
 
Protect your devices
 
Protect your accounts

Revision as of 13:40, 28 February 2024

[ 🚧 Under Construction]

Context analysis

How the Internet works...

Assessing risk

Security Planner: Assessment and planning tools

Analyzing threats

Threats to your information:

  • Data loss
  • Compromised accounts
  • Device inspection at checkpoints
  • Device confiscation or theft
  • Information handover
  • Targeted malware
  • Surveillance and monitoring

Determine mitigation measures

Protect your devices

Protect yourself online

Protect your accounts using strong passwords, pw managers, 2fa - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts.

Safe internet browsing using VPN and Tor browser - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online.

Protect your information

Online harassment

How to deal with online harassment and threats

Producing security plans

General guidance for creating security plans and agreements

Security considerations when travelling

General tips for international travel


Resource collections

Digital First Aid Kit - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.

Access Now Help Desk documentation



More info:

Secure storage for sensitive information

Secure access to sensitive information

Secure your devices