Online Self Defense – Black Belt Level

Online Self Defense – Black Belt Level

Online Self Defense – Black Belt Level Review - White Belt Level 1.Do your updates 2.Use good antivirus/antimalware software 3.A long password is a strong password 4.Be suspicious of all emails, particularly those asking you to click on links, or that have attachments. Review – Yellow Belt 1.Always verify t!at you are on the we#site you mean to be 2.$et #rowser to more secure settings 3.Use privacy enhancing browser plugins 4.$can everything you download %.Only download programs from the official we#site Review - Green Belt Level ● (nformation is the currency of the internet ● )rivacy has finincial as well as ethical implications ● *a"e sure that your connection is encrypted +,--)$. ● Anonymizing we# proxies can help ● 1)Ns are better ● -or Browser is even better Review – Brown Belt Level 1.Unencrypted email is like sending a postcard instead of a letter 2.-o encrypt email use *ozilla -!under#ird with the 3nigmail plugin 3.-o encrypt chat use Pidgin with the OTR plugin Threat Modeling Decide what your most likely t!reats and plan your defense based on the following questions. 1. What is the most vulnerable/exploitable? 2. What is the most valuable? 3.How can I mitigate my vulnerabilities? 4. What can I o to limit amage i! an attac" is success!ul? Segregation of Identity ● Limit ability of a t!ird party to connect di'erent aspects of your life. 7or e0ample casual we# #rowsing and !ome #anking. ● 8roup activities wit! similar security re5uirements. ● Be self disciplined a#out t!is segregation. It is !ard! ● Segregation limits scope of damage in case of a successful attac" against you. Tor – What is it" Tor Browser B#ndle ● !ttps://www.torpro;ect.org/download/download ● Works on Windows, Linux, Mac, Android ● No installation is needed. Can even be kept on a U$B drive Tor ● What does it do> ● What does it not do> ● What should you not do with it> TAILS is a secure operating system that is designed to -he do everything possible to ensure you privacy and security. By default it provides the following benefits: Amnesic 1.It uses state of the art encryption for files, emails, and instant messaging (ncognito 2.It leaves no trace on the computer it is used on. 3.It gives strong privacy protection by forcing all traffic Live through the Tor Network 4.It is a mobile operating system that can be carried on a System keychain and used anywhere Getting T$ LS ● -A(6$ can be downloaded from !ttps://tails.#oum.org/install/index.en.html ● All instructions for installing TAI6$ are provided by the site ● -A(6$ can also be copied from any other TA(6$ drive .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us