Security resources organized by topic

From TCU Wiki

[ 🚧 Under Construction]

Context analysis

How the Internet works...

Assessing risk

Security Planner: Assessment and planning tools

Analyzing threats

Threats to your information:

  • Data loss
  • Compromised accounts
  • Device inspection at checkpoints
  • Device confiscation or theft
  • Information handover
  • Targeted malware
  • Surveillance and monitoring

Determine mitigation measures

Protect your devices

Protect yourself online

Protect your accounts using strong passwords, pw managers, 2fa - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts.

Safe internet browsing using VPN and Tor browser - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online.

Protect your information

Online harassment

How to deal with online harassment and threats

Producing security plans

General guidance for creating security plans and agreements

Security considerations when travelling

General tips for international travel

Resource collections

Digital First Aid Kit - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.

Access Now Help Desk documentation

More info:

Secure storage for sensitive information

Secure access to sensitive information

Secure your devices