SlideShare une entreprise Scribd logo
1  sur  25
Digital Risks
and Security for Activists
eCampaigning Forum
Future Forum
April 11th, 2014
Dirk Slater
FabRiders- www.fabrider.net
@fabrider
 Evolution of Information Security
 Stuff that makes us vulnerable
 The Problem with Online Services and Security
Tools
 Frameworks for Information Security
 Responsibility of Data Collectors
 Some tools and resources
Today
 A personal look at protecting information
 The rise of the relational database
Evolution of Information
Security
Stuff that makes us
Vulnerable
• Email
• Search engines
• Web browsers
• Cloud services
• VoIP comms
• Social networking
• (i.e. everything we do on the internet)
MOBILES
Stuff That Makes Us
Vulnerable
The problem with
online services
If you aren't paying for it
you are the product
The problem with
online services
The problem with
online services
Why are we surprised?
The problem with
security tools
They are often counter-intuitive
and not in the reach of mere mortals
They often arise suspicion
It's an arms race
 Information about us is shared everywhere
 Online Services are completely insecure and are
making money off the information they are collecting
 Security tools are problematic
So?
What about just
using a notebook?
 How does information itself make people
vulnerable?
Information Security not
Digital Security
Three things to remember
when sharing information
What are your assets?
What are the threats?
What are the risks?
Assets
How is the information valuable?
What is the threat?
• Confidentiality is keeping assets or knowledge about assets away
from unauthorized parties.
• Integrity is keeping assets undamaged and unaltered.
• Availability is the assurance that assets are available to parties
authorized to use them.
• Consistency is when assets behave and work as expected, all the
time.
• Control is the regulation of access to assets.
• Audit is the ability to verify that assets are secure.
What is the Risk?
The Likelihood of a Threat Actually Occurring:
• Confidentiality
• Integrity
• Availability
• Consi
• stency
• Control
• Verification
Responsibility of
Data Collection
• How can information be traced back
to real people?
• What are the implications of that?
Responsibility of
Data Collection
• Do you have consent?
• Do people understand how you are
going to use the data?
• Do people understand the risks?
Five Questions About
Security Solutions*
 What assets are you trying to protect?
 What are the risks to those assets?
 How well does the security solution mitigate
those risks?
 What other risks does the security solution
cause?
 What costs and trade-offs does the security
solution impose?
* from Bruce Shneier's book 'Beyond Fear'
 Password Managers
 PGP (email encryption)
 TOR
 The Guardian Project (TOR for
Android)
Security Tools to Consider
 What are the assets, risks, & threats?
 Be responsible in your data collection
 Consider using security tools after you’ve assessed
their impact
Remember
 EFF’s Surveillance Self Defense -
https://ssd.eff.org/risk
 Tactical Tech’s Protect Program –
https://protect.tacticaltech.org/
 Me and My Shadow https://myshadow.org/#
 Article 19’s Online Protection
Videoshttp://www.article19.org/online-protection/
Resources
Dirk Slater
FabRiders
dirk@fabriders.net
www.fabriders.net
Twitter: @fabrider
THANKS!!!

Contenu connexe

Tendances

Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risksrisksmith
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of nortonspkiely
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber securitySamanvay Jain
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedAlan Eardley
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data ProtectionNICVA
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 

Tendances (20)

Resume harris 19x
Resume harris 19xResume harris 19x
Resume harris 19x
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Information security
Information securityInformation security
Information security
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Trustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simpleTrustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simple
 
Harris resume
Harris resumeHarris resume
Harris resume
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Security in it
Security in it Security in it
Security in it
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts Explained
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
hacking
hackinghacking
hacking
 

En vedette

What it takes to be successful in e-campaigning
What it takes to be successful in e-campaigningWhat it takes to be successful in e-campaigning
What it takes to be successful in e-campaigningFairSay
 
Digital social giving
Digital social givingDigital social giving
Digital social givingFairSay
 
UK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 ResultsUK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 ResultsFairSay
 
2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance BenchmarksFairSay
 
From Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon AlexanderFrom Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon AlexanderFairSay
 
2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action ComparisonFairSay
 
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...FairSay
 
Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15FairSay
 

En vedette (8)

What it takes to be successful in e-campaigning
What it takes to be successful in e-campaigningWhat it takes to be successful in e-campaigning
What it takes to be successful in e-campaigning
 
Digital social giving
Digital social givingDigital social giving
Digital social giving
 
UK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 ResultsUK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 Results
 
2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks
 
From Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon AlexanderFrom Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon Alexander
 
2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison
 
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
 
Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15
 

Similaire à Digi securitypres

Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesJack Pringle
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxInfosectrain3
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 

Similaire à Digi securitypres (20)

Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 

Plus de FairSay

How to make an online style guide
How to make an online style guideHow to make an online style guide
How to make an online style guideFairSay
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the faceFairSay
 
Decoupling
DecouplingDecoupling
DecouplingFairSay
 
Responsive digital campaigning
Responsive digital campaigningResponsive digital campaigning
Responsive digital campaigningFairSay
 
The robots are our friends
The robots are our friendsThe robots are our friends
The robots are our friendsFairSay
 
Lived experience in campaigning
Lived experience in campaigningLived experience in campaigning
Lived experience in campaigningFairSay
 
Mothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate changeMothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate changeFairSay
 
How to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutesHow to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutesFairSay
 
Building social power
Building social powerBuilding social power
Building social powerFairSay
 
Ineffecient activism
Ineffecient activismIneffecient activism
Ineffecient activismFairSay
 
A year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The RooftopA year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The RooftopFairSay
 
Plastic-free periods
Plastic-free periodsPlastic-free periods
Plastic-free periodsFairSay
 
What’s your point?
What’s your point?What’s your point?
What’s your point?FairSay
 
Climate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the ChoirClimate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the ChoirFairSay
 
Beyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impactBeyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impactFairSay
 
Who Is Doing Content Well
Who Is Doing Content WellWho Is Doing Content Well
Who Is Doing Content WellFairSay
 
Can We Save The World
Can We Save The World Can We Save The World
Can We Save The World FairSay
 
Gentle protest
Gentle protestGentle protest
Gentle protestFairSay
 
Introduction to Agile project management for campaigners
Introduction to Agile project management for campaignersIntroduction to Agile project management for campaigners
Introduction to Agile project management for campaignersFairSay
 
The ABC of AB testing
The ABC of AB testingThe ABC of AB testing
The ABC of AB testingFairSay
 

Plus de FairSay (20)

How to make an online style guide
How to make an online style guideHow to make an online style guide
How to make an online style guide
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
Decoupling
DecouplingDecoupling
Decoupling
 
Responsive digital campaigning
Responsive digital campaigningResponsive digital campaigning
Responsive digital campaigning
 
The robots are our friends
The robots are our friendsThe robots are our friends
The robots are our friends
 
Lived experience in campaigning
Lived experience in campaigningLived experience in campaigning
Lived experience in campaigning
 
Mothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate changeMothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate change
 
How to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutesHow to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutes
 
Building social power
Building social powerBuilding social power
Building social power
 
Ineffecient activism
Ineffecient activismIneffecient activism
Ineffecient activism
 
A year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The RooftopA year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The Rooftop
 
Plastic-free periods
Plastic-free periodsPlastic-free periods
Plastic-free periods
 
What’s your point?
What’s your point?What’s your point?
What’s your point?
 
Climate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the ChoirClimate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the Choir
 
Beyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impactBeyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impact
 
Who Is Doing Content Well
Who Is Doing Content WellWho Is Doing Content Well
Who Is Doing Content Well
 
Can We Save The World
Can We Save The World Can We Save The World
Can We Save The World
 
Gentle protest
Gentle protestGentle protest
Gentle protest
 
Introduction to Agile project management for campaigners
Introduction to Agile project management for campaignersIntroduction to Agile project management for campaigners
Introduction to Agile project management for campaigners
 
The ABC of AB testing
The ABC of AB testingThe ABC of AB testing
The ABC of AB testing
 

Dernier

Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...SUHANI PANDEY
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...tanu pandey
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCNAP Global Network
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)Congressional Budget Office
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...tanu pandey
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)NAP Global Network
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisChristina Parmionova
 
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...Call Girls in Nagpur High Profile
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 

Dernier (20)

Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 

Digi securitypres

  • 1. Digital Risks and Security for Activists eCampaigning Forum Future Forum April 11th, 2014 Dirk Slater FabRiders- www.fabrider.net @fabrider
  • 2.
  • 3.  Evolution of Information Security  Stuff that makes us vulnerable  The Problem with Online Services and Security Tools  Frameworks for Information Security  Responsibility of Data Collectors  Some tools and resources Today
  • 4.  A personal look at protecting information  The rise of the relational database Evolution of Information Security
  • 5. Stuff that makes us Vulnerable • Email • Search engines • Web browsers • Cloud services • VoIP comms • Social networking • (i.e. everything we do on the internet)
  • 6. MOBILES Stuff That Makes Us Vulnerable
  • 7. The problem with online services If you aren't paying for it you are the product
  • 10. Why are we surprised?
  • 11. The problem with security tools They are often counter-intuitive and not in the reach of mere mortals They often arise suspicion It's an arms race
  • 12.  Information about us is shared everywhere  Online Services are completely insecure and are making money off the information they are collecting  Security tools are problematic So?
  • 13. What about just using a notebook?
  • 14.  How does information itself make people vulnerable? Information Security not Digital Security
  • 15. Three things to remember when sharing information What are your assets? What are the threats? What are the risks?
  • 16. Assets How is the information valuable?
  • 17. What is the threat? • Confidentiality is keeping assets or knowledge about assets away from unauthorized parties. • Integrity is keeping assets undamaged and unaltered. • Availability is the assurance that assets are available to parties authorized to use them. • Consistency is when assets behave and work as expected, all the time. • Control is the regulation of access to assets. • Audit is the ability to verify that assets are secure.
  • 18. What is the Risk? The Likelihood of a Threat Actually Occurring: • Confidentiality • Integrity • Availability • Consi • stency • Control • Verification
  • 19. Responsibility of Data Collection • How can information be traced back to real people? • What are the implications of that?
  • 20. Responsibility of Data Collection • Do you have consent? • Do people understand how you are going to use the data? • Do people understand the risks?
  • 21. Five Questions About Security Solutions*  What assets are you trying to protect?  What are the risks to those assets?  How well does the security solution mitigate those risks?  What other risks does the security solution cause?  What costs and trade-offs does the security solution impose? * from Bruce Shneier's book 'Beyond Fear'
  • 22.  Password Managers  PGP (email encryption)  TOR  The Guardian Project (TOR for Android) Security Tools to Consider
  • 23.  What are the assets, risks, & threats?  Be responsible in your data collection  Consider using security tools after you’ve assessed their impact Remember
  • 24.  EFF’s Surveillance Self Defense - https://ssd.eff.org/risk  Tactical Tech’s Protect Program – https://protect.tacticaltech.org/  Me and My Shadow https://myshadow.org/#  Article 19’s Online Protection Videoshttp://www.article19.org/online-protection/ Resources