SlideShare a Scribd company logo
Cybersecurity
Take Control of Your Digital Space
Stay Anonymous
VPN (Virtual Private Network)
virtualised extension of a private network across a public
network, such as the Internet
created by establishing a virtual point-to-point connection
through the use of dedicated connections, virtual tunneling
protocols, or traffic encryption
masks IP address – more privacy for all online activities
WiTopia | AirVPN | CyberGhost VPN | TunnelBear VPN
http://www.techradar.com/news/the-best-vpn-services-and-
vpn-deals-of-2017
Stay Anonymous
Tor (Onion Router)
free software and an open network of volunteer-operated servers
that allows people to improve their privacy and security on the
Internet
using a Tor browser prevents others from learning location or
browsing habits (traffic analysis)
anonymous, but not private - slower connection!
https://www.torproject.org
Stay Anonymous
Trails (The Amnesic Incognito Live System)
a complete operating system
starts on any computer from a DVD, USB stick, or SD card
sends traffic through Tor network
use anywhere but leave no trace
https://tails.boum.org/
Browse Safely
Settings
Private Browsing
Don’t track
Cookies
Proxy Server
Search Engines
http://www.hongkiat.com/blog/private-search-engines/
Browse Safely
Extensions
Privacy Badger
disconnect.me
https everywhere
Ad-Blocker
Own Your Data
Encryption
non encrypted files & media are not private
encrypt hard-drive: File Vault MacOSX | Windows 10 incl.
PGP (Pretty Good Privacy) 

– used for signing, encrypting, and decrypting texts, e-mails, files,
directories and digital signature
MacOSX: https://ssd.eff.org/en/module/how-use-pgp-mac-os-x
Windows: https://ssd.eff.org/en/module/how-use-pgp-windows
Own Your Data
Back Up
create bootable OS
local back up: encrypted external drive
cloud back up: encrypted provider
Spider Oak | SugarSync | Backblaze
https://www.lifewire.com/online-backup-services-
reviewed-2624712
Protect Your Identity
Social Engineering | Phishing
never login into any account through email link
keep all software up-to-date
no login via social media accounts or google accounts
use https connections wherever possible
be aware of public WiFi
make up personal info - don’t give away information
use disposable email addresses
Protect Your Identity
Password Manager
LastPass | 1Password | Dashlane
https://lifehacker.com/5529133/five-best-password-managers
Two Factor Authentication (2FA)
a method of confirming a user's claimed identity by utilising a
combination of two different components
Authy: https://www.authy.com/app/
Damage Control
Anti-Virus Software
a computer virus is a program or piece of code that is loaded onto
your computer without your knowledge or permission.
never go online without anti-virus installed and firewall activated
Avast | Sophos | Avira and many more
http://www.tomsguide.com/us/best-antivirus,review-2588-6.html
Damage Control
Malware Detection (Malicious)
annoying or harmful type of software intended to secretly access
a device without the user's knowledge
types of malware include spyware, adware, phishing, viruses,
trojan horses, worms, rootkits, ransomware, browser hijackers
free: https://www.malwarebytes.com/mac/
learn about security: https://www.avast.com/c-online-threats
check your email accounts: https://haveibeenpwned.com/
“You have the right to exist safely in digital spaces.”
DIY Feminist Cybersecurity

https://hackblossom.org/cybersecurity/
© morningside / photocase.com

More Related Content

What's hot

HMA
HMAHMA
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
Anne Adrian
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
guest2bd2b2
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
F-Secure Corporation
 
Proj 3
Proj 3Proj 3
How To Remove 4-you.net From Computer System?
How To Remove 4-you.net From Computer System?How To Remove 4-you.net From Computer System?
How To Remove 4-you.net From Computer System?
SallieCGoddard
 
Proj 3(1)
Proj 3(1)Proj 3(1)
Proj 3(1)
SallieCGoddard
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
Quick Heal Technologies Ltd.
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Phishing with Super Bait
Phishing with Super BaitPhishing with Super Bait
Phishing with Super Bait
Jeremiah Grossman
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
primomh
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
John Dorner
 
Fortinet
FortinetFortinet
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
Novosco
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
F-Secure Corporation
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safetyreidcollins42
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Luca Bongiorni
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentationkatelyn-fogarty
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animationkatelyn-fogarty
 

What's hot (20)

HMA
HMAHMA
HMA
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 
Proj 3
Proj 3Proj 3
Proj 3
 
How To Remove 4-you.net From Computer System?
How To Remove 4-you.net From Computer System?How To Remove 4-you.net From Computer System?
How To Remove 4-you.net From Computer System?
 
Proj 3(1)
Proj 3(1)Proj 3(1)
Proj 3(1)
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Phishing with Super Bait
Phishing with Super BaitPhishing with Super Bait
Phishing with Super Bait
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
Fortinet
FortinetFortinet
Fortinet
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
 

Similar to Cybersecurity

windows_Device_Hardening.pptx
windows_Device_Hardening.pptxwindows_Device_Hardening.pptx
windows_Device_Hardening.pptx
SharifulShishir
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
Sangfor Technologies USA
 
Cyber security
Cyber securityCyber security
Cyber security
Anju Sharma
 
Internet security
Internet securityInternet security
Internet security
Tapan Khilar
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
pgmaynard
 
CursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdfCursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdf
JoseRamirez372702
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
Yoav Crombie
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
hidivin652
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewall
entensys
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
Tatyana Kobets
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
Ritwik Das
 
Squid server
Squid serverSquid server
Squid server
Rohit Phulsunge
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
Vograce
 
iotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwiniotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwinwebinos project
 
IoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - BaldwinIoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - Baldwinwebinos project
 

Similar to Cybersecurity (20)

windows_Device_Hardening.pptx
windows_Device_Hardening.pptxwindows_Device_Hardening.pptx
windows_Device_Hardening.pptx
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet security
Internet securityInternet security
Internet security
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
CursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdfCursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdf
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Firewalls
FirewallsFirewalls
Firewalls
 
The vpn
The vpnThe vpn
The vpn
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewall
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Squid server
Squid serverSquid server
Squid server
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
iotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwiniotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwin
 
IoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - BaldwinIoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - Baldwin
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 

Recently uploaded (16)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 

Cybersecurity

  • 1. Cybersecurity Take Control of Your Digital Space
  • 2. Stay Anonymous VPN (Virtual Private Network) virtualised extension of a private network across a public network, such as the Internet created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption masks IP address – more privacy for all online activities WiTopia | AirVPN | CyberGhost VPN | TunnelBear VPN http://www.techradar.com/news/the-best-vpn-services-and- vpn-deals-of-2017
  • 3. Stay Anonymous Tor (Onion Router) free software and an open network of volunteer-operated servers that allows people to improve their privacy and security on the Internet using a Tor browser prevents others from learning location or browsing habits (traffic analysis) anonymous, but not private - slower connection! https://www.torproject.org
  • 4. Stay Anonymous Trails (The Amnesic Incognito Live System) a complete operating system starts on any computer from a DVD, USB stick, or SD card sends traffic through Tor network use anywhere but leave no trace https://tails.boum.org/
  • 5. Browse Safely Settings Private Browsing Don’t track Cookies Proxy Server Search Engines http://www.hongkiat.com/blog/private-search-engines/
  • 7. Own Your Data Encryption non encrypted files & media are not private encrypt hard-drive: File Vault MacOSX | Windows 10 incl. PGP (Pretty Good Privacy) 
 – used for signing, encrypting, and decrypting texts, e-mails, files, directories and digital signature MacOSX: https://ssd.eff.org/en/module/how-use-pgp-mac-os-x Windows: https://ssd.eff.org/en/module/how-use-pgp-windows
  • 8. Own Your Data Back Up create bootable OS local back up: encrypted external drive cloud back up: encrypted provider Spider Oak | SugarSync | Backblaze https://www.lifewire.com/online-backup-services- reviewed-2624712
  • 9. Protect Your Identity Social Engineering | Phishing never login into any account through email link keep all software up-to-date no login via social media accounts or google accounts use https connections wherever possible be aware of public WiFi make up personal info - don’t give away information use disposable email addresses
  • 10. Protect Your Identity Password Manager LastPass | 1Password | Dashlane https://lifehacker.com/5529133/five-best-password-managers Two Factor Authentication (2FA) a method of confirming a user's claimed identity by utilising a combination of two different components Authy: https://www.authy.com/app/
  • 11. Damage Control Anti-Virus Software a computer virus is a program or piece of code that is loaded onto your computer without your knowledge or permission. never go online without anti-virus installed and firewall activated Avast | Sophos | Avira and many more http://www.tomsguide.com/us/best-antivirus,review-2588-6.html
  • 12. Damage Control Malware Detection (Malicious) annoying or harmful type of software intended to secretly access a device without the user's knowledge types of malware include spyware, adware, phishing, viruses, trojan horses, worms, rootkits, ransomware, browser hijackers free: https://www.malwarebytes.com/mac/ learn about security: https://www.avast.com/c-online-threats check your email accounts: https://haveibeenpwned.com/
  • 13. “You have the right to exist safely in digital spaces.” DIY Feminist Cybersecurity
 https://hackblossom.org/cybersecurity/ © morningside / photocase.com