SlideShare a Scribd company logo
Digital Risks
and Security for Activists
eCampaigning Forum
Future Forum
April 11th, 2014
Dirk Slater
FabRiders- www.fabrider.net
@fabrider
 Evolution of Information Security
 Stuff that makes us vulnerable
 The Problem with Online Services and Security
Tools
 Frameworks for Information Security
 Responsibility of Data Collectors
 Some tools and resources
Today
 A personal look at protecting information
 The rise of the relational database
Evolution of Information
Security
Stuff that makes us
Vulnerable
• Email
• Search engines
• Web browsers
• Cloud services
• VoIP comms
• Social networking
• (i.e. everything we do on the internet)
MOBILES
Stuff That Makes Us
Vulnerable
The problem with
online services
If you aren't paying for it
you are the product
The problem with
online services
The problem with
online services
Why are we surprised?
The problem with
security tools
They are often counter-intuitive
and not in the reach of mere mortals
They often arise suspicion
It's an arms race
 Information about us is shared everywhere
 Online Services are completely insecure and are
making money off the information they are collecting
 Security tools are problematic
So?
What about just
using a notebook?
 How does information itself make people
vulnerable?
Information Security not
Digital Security
Three things to remember
when sharing information
What are your assets?
What are the threats?
What are the risks?
Assets
How is the information valuable?
What is the threat?
• Confidentiality is keeping assets or knowledge about assets away
from unauthorized parties.
• Integrity is keeping assets undamaged and unaltered.
• Availability is the assurance that assets are available to parties
authorized to use them.
• Consistency is when assets behave and work as expected, all the
time.
• Control is the regulation of access to assets.
• Audit is the ability to verify that assets are secure.
What is the Risk?
The Likelihood of a Threat Actually Occurring:
• Confidentiality
• Integrity
• Availability
• Consi
• stency
• Control
• Verification
Responsibility of
Data Collection
• How can information be traced back
to real people?
• What are the implications of that?
Responsibility of
Data Collection
• Do you have consent?
• Do people understand how you are
going to use the data?
• Do people understand the risks?
Five Questions About
Security Solutions*
 What assets are you trying to protect?
 What are the risks to those assets?
 How well does the security solution mitigate
those risks?
 What other risks does the security solution
cause?
 What costs and trade-offs does the security
solution impose?
* from Bruce Shneier's book 'Beyond Fear'
 Password Managers
 PGP (email encryption)
 TOR
 The Guardian Project (TOR for
Android)
Security Tools to Consider
 What are the assets, risks, & threats?
 Be responsible in your data collection
 Consider using security tools after you’ve assessed
their impact
Remember
 EFF’s Surveillance Self Defense -
https://ssd.eff.org/risk
 Tactical Tech’s Protect Program –
https://protect.tacticaltech.org/
 Me and My Shadow https://myshadow.org/#
 Article 19’s Online Protection
Videoshttp://www.article19.org/online-protection/
Resources
Dirk Slater
FabRiders
dirk@fabriders.net
www.fabriders.net
Twitter: @fabrider
THANKS!!!

More Related Content

What's hot

Resume harris 19x
Resume harris 19xResume harris 19x
Resume harris 19x
NickHarris84
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
Gianluca Varisco
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
CyberGuider IT Services Inc.
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Edwin A. Opare
 
Trustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simpleTrustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simple
G.F. Windsor, Barrister & Solicitor
 
Harris resume
Harris resumeHarris resume
Harris resume
NickHarris84
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
risksmith
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of nortonspkiely
 
Security in it
Security in it Security in it
Security in it
Yoshan madhumal
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
Samanvay Jain
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts Explained
Alan Eardley
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
NICVA
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
Brian T. O'Hara CISA, CISM, CRISC, CCSP, CISSP
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
hacking
hackinghacking
hacking
mayank1293
 

What's hot (20)

Resume harris 19x
Resume harris 19xResume harris 19x
Resume harris 19x
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Information security
Information securityInformation security
Information security
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Trustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simpleTrustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simple
 
Harris resume
Harris resumeHarris resume
Harris resume
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Security in it
Security in it Security in it
Security in it
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts Explained
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
hacking
hackinghacking
hacking
 

Viewers also liked

What it takes to be successful in e-campaigning
What it takes to be successful in e-campaigningWhat it takes to be successful in e-campaigning
What it takes to be successful in e-campaigningFairSay
 
Digital social giving
Digital social givingDigital social giving
Digital social giving
FairSay
 
UK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 ResultsUK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 Results
FairSay
 
2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks
FairSay
 
From Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon AlexanderFrom Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon AlexanderFairSay
 
2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison
FairSay
 
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...FairSay
 
Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15
FairSay
 

Viewers also liked (8)

What it takes to be successful in e-campaigning
What it takes to be successful in e-campaigningWhat it takes to be successful in e-campaigning
What it takes to be successful in e-campaigning
 
Digital social giving
Digital social givingDigital social giving
Digital social giving
 
UK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 ResultsUK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 Results
 
2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks
 
From Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon AlexanderFrom Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon Alexander
 
2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison
 
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
 
Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15
 

Similar to Digi securitypres

Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
Aksum Institute of Technology(AIT, @Letsgo)
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
APNIC
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
Idealware
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
Jack Pringle
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
TI Safe
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
Infosectrain3
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
LYRASIS
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Shawn Tuma
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
Abbie Hosta
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
Gryffin EJ
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
SharmaAnirudh2
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
Bavijesh Thaliyil
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
Stephen Cobb
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
Hannah Jane del Castillo
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 

Similar to Digi securitypres (20)

Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 

More from FairSay

How to make an online style guide
How to make an online style guideHow to make an online style guide
How to make an online style guide
FairSay
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
FairSay
 
Decoupling
DecouplingDecoupling
Decoupling
FairSay
 
Responsive digital campaigning
Responsive digital campaigningResponsive digital campaigning
Responsive digital campaigning
FairSay
 
The robots are our friends
The robots are our friendsThe robots are our friends
The robots are our friends
FairSay
 
Lived experience in campaigning
Lived experience in campaigningLived experience in campaigning
Lived experience in campaigning
FairSay
 
Mothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate changeMothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate change
FairSay
 
How to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutesHow to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutes
FairSay
 
Building social power
Building social powerBuilding social power
Building social power
FairSay
 
Ineffecient activism
Ineffecient activismIneffecient activism
Ineffecient activism
FairSay
 
A year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The RooftopA year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The Rooftop
FairSay
 
Plastic-free periods
Plastic-free periodsPlastic-free periods
Plastic-free periods
FairSay
 
What’s your point?
What’s your point?What’s your point?
What’s your point?
FairSay
 
Climate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the ChoirClimate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the Choir
FairSay
 
Beyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impactBeyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impact
FairSay
 
Who Is Doing Content Well
Who Is Doing Content WellWho Is Doing Content Well
Who Is Doing Content Well
FairSay
 
Can We Save The World
Can We Save The World Can We Save The World
Can We Save The World
FairSay
 
Gentle protest
Gentle protestGentle protest
Gentle protest
FairSay
 
Introduction to Agile project management for campaigners
Introduction to Agile project management for campaignersIntroduction to Agile project management for campaigners
Introduction to Agile project management for campaigners
FairSay
 
The ABC of AB testing
The ABC of AB testingThe ABC of AB testing
The ABC of AB testing
FairSay
 

More from FairSay (20)

How to make an online style guide
How to make an online style guideHow to make an online style guide
How to make an online style guide
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
Decoupling
DecouplingDecoupling
Decoupling
 
Responsive digital campaigning
Responsive digital campaigningResponsive digital campaigning
Responsive digital campaigning
 
The robots are our friends
The robots are our friendsThe robots are our friends
The robots are our friends
 
Lived experience in campaigning
Lived experience in campaigningLived experience in campaigning
Lived experience in campaigning
 
Mothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate changeMothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate change
 
How to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutesHow to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutes
 
Building social power
Building social powerBuilding social power
Building social power
 
Ineffecient activism
Ineffecient activismIneffecient activism
Ineffecient activism
 
A year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The RooftopA year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The Rooftop
 
Plastic-free periods
Plastic-free periodsPlastic-free periods
Plastic-free periods
 
What’s your point?
What’s your point?What’s your point?
What’s your point?
 
Climate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the ChoirClimate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the Choir
 
Beyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impactBeyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impact
 
Who Is Doing Content Well
Who Is Doing Content WellWho Is Doing Content Well
Who Is Doing Content Well
 
Can We Save The World
Can We Save The World Can We Save The World
Can We Save The World
 
Gentle protest
Gentle protestGentle protest
Gentle protest
 
Introduction to Agile project management for campaigners
Introduction to Agile project management for campaignersIntroduction to Agile project management for campaigners
Introduction to Agile project management for campaigners
 
The ABC of AB testing
The ABC of AB testingThe ABC of AB testing
The ABC of AB testing
 

Recently uploaded

PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 

Recently uploaded (20)

PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 

Digi securitypres

  • 1. Digital Risks and Security for Activists eCampaigning Forum Future Forum April 11th, 2014 Dirk Slater FabRiders- www.fabrider.net @fabrider
  • 2.
  • 3.  Evolution of Information Security  Stuff that makes us vulnerable  The Problem with Online Services and Security Tools  Frameworks for Information Security  Responsibility of Data Collectors  Some tools and resources Today
  • 4.  A personal look at protecting information  The rise of the relational database Evolution of Information Security
  • 5. Stuff that makes us Vulnerable • Email • Search engines • Web browsers • Cloud services • VoIP comms • Social networking • (i.e. everything we do on the internet)
  • 6. MOBILES Stuff That Makes Us Vulnerable
  • 7. The problem with online services If you aren't paying for it you are the product
  • 10. Why are we surprised?
  • 11. The problem with security tools They are often counter-intuitive and not in the reach of mere mortals They often arise suspicion It's an arms race
  • 12.  Information about us is shared everywhere  Online Services are completely insecure and are making money off the information they are collecting  Security tools are problematic So?
  • 13. What about just using a notebook?
  • 14.  How does information itself make people vulnerable? Information Security not Digital Security
  • 15. Three things to remember when sharing information What are your assets? What are the threats? What are the risks?
  • 16. Assets How is the information valuable?
  • 17. What is the threat? • Confidentiality is keeping assets or knowledge about assets away from unauthorized parties. • Integrity is keeping assets undamaged and unaltered. • Availability is the assurance that assets are available to parties authorized to use them. • Consistency is when assets behave and work as expected, all the time. • Control is the regulation of access to assets. • Audit is the ability to verify that assets are secure.
  • 18. What is the Risk? The Likelihood of a Threat Actually Occurring: • Confidentiality • Integrity • Availability • Consi • stency • Control • Verification
  • 19. Responsibility of Data Collection • How can information be traced back to real people? • What are the implications of that?
  • 20. Responsibility of Data Collection • Do you have consent? • Do people understand how you are going to use the data? • Do people understand the risks?
  • 21. Five Questions About Security Solutions*  What assets are you trying to protect?  What are the risks to those assets?  How well does the security solution mitigate those risks?  What other risks does the security solution cause?  What costs and trade-offs does the security solution impose? * from Bruce Shneier's book 'Beyond Fear'
  • 22.  Password Managers  PGP (email encryption)  TOR  The Guardian Project (TOR for Android) Security Tools to Consider
  • 23.  What are the assets, risks, & threats?  Be responsible in your data collection  Consider using security tools after you’ve assessed their impact Remember
  • 24.  EFF’s Surveillance Self Defense - https://ssd.eff.org/risk  Tactical Tech’s Protect Program – https://protect.tacticaltech.org/  Me and My Shadow https://myshadow.org/#  Article 19’s Online Protection Videoshttp://www.article19.org/online-protection/ Resources