SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Digital Risks
and Security for Activists
eCampaigning Forum
Future Forum
April 11th, 2014
Dirk Slater
FabRiders- www.fabrider.net
@fabrider
 Evolution of Information Security
 Stuff that makes us vulnerable
 The Problem with Online Services and Security
Tools
 Frameworks for Information Security
 Responsibility of Data Collectors
 Some tools and resources
Today
 A personal look at protecting information
 The rise of the relational database
Evolution of Information
Security
Stuff that makes us
Vulnerable
• Email
• Search engines
• Web browsers
• Cloud services
• VoIP comms
• Social networking
• (i.e. everything we do on the internet)
MOBILES
Stuff That Makes Us
Vulnerable
The problem with
online services
If you aren't paying for it
you are the product
The problem with
online services
The problem with
online services
Why are we surprised?
The problem with
security tools
They are often counter-intuitive
and not in the reach of mere mortals
They often arise suspicion
It's an arms race
 Information about us is shared everywhere
 Online Services are completely insecure and are
making money off the information they are collecting
 Security tools are problematic
So?
What about just
using a notebook?
 How does information itself make people
vulnerable?
Information Security not
Digital Security
Three things to remember
when sharing information
What are your assets?
What are the threats?
What are the risks?
Assets
How is the information valuable?
What is the threat?
• Confidentiality is keeping assets or knowledge about assets away
from unauthorized parties.
• Integrity is keeping assets undamaged and unaltered.
• Availability is the assurance that assets are available to parties
authorized to use them.
• Consistency is when assets behave and work as expected, all the
time.
• Control is the regulation of access to assets.
• Audit is the ability to verify that assets are secure.
What is the Risk?
The Likelihood of a Threat Actually Occurring:
• Confidentiality
• Integrity
• Availability
• Consi
• stency
• Control
• Verification
Responsibility of
Data Collection
• How can information be traced back
to real people?
• What are the implications of that?
Responsibility of
Data Collection
• Do you have consent?
• Do people understand how you are
going to use the data?
• Do people understand the risks?
Five Questions About
Security Solutions*
 What assets are you trying to protect?
 What are the risks to those assets?
 How well does the security solution mitigate
those risks?
 What other risks does the security solution
cause?
 What costs and trade-offs does the security
solution impose?
* from Bruce Shneier's book 'Beyond Fear'
 Password Managers
 PGP (email encryption)
 TOR
 The Guardian Project (TOR for
Android)
Security Tools to Consider
 What are the assets, risks, & threats?
 Be responsible in your data collection
 Consider using security tools after you’ve assessed
their impact
Remember
 EFF’s Surveillance Self Defense -
https://ssd.eff.org/risk
 Tactical Tech’s Protect Program –
https://protect.tacticaltech.org/
 Me and My Shadow https://myshadow.org/#
 Article 19’s Online Protection
Videoshttp://www.article19.org/online-protection/
Resources
Dirk Slater
FabRiders
dirk@fabriders.net
www.fabriders.net
Twitter: @fabrider
THANKS!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
talhaabid
 

Was ist angesagt? (20)

Resume harris 19x
Resume harris 19xResume harris 19x
Resume harris 19x
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Information security
Information securityInformation security
Information security
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Trustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simpleTrustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simple
 
Harris resume
Harris resumeHarris resume
Harris resume
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Security in it
Security in it Security in it
Security in it
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts Explained
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
hacking
hackinghacking
hacking
 

Andere mochten auch (8)

What it takes to be successful in e-campaigning
What it takes to be successful in e-campaigningWhat it takes to be successful in e-campaigning
What it takes to be successful in e-campaigning
 
Digital social giving
Digital social givingDigital social giving
Digital social giving
 
UK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 ResultsUK MP eCampaigning Survey 2006 Results
UK MP eCampaigning Survey 2006 Results
 
2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks2009 eCampaigning Review: Performance Benchmarks
2009 eCampaigning Review: Performance Benchmarks
 
From Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon AlexanderFrom Consumer to Citizen - Jon Alexander
From Consumer to Citizen - Jon Alexander
 
2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison2009 eCampaigning Review: Practices Survey and Action Comparison
2009 eCampaigning Review: Practices Survey and Action Comparison
 
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...Transforming organisations through digital strategy - Sam Jeffers, Blue State...
Transforming organisations through digital strategy - Sam Jeffers, Blue State...
 
Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15Craftivism: An Ignite presentation at ECF15
Craftivism: An Ignite presentation at ECF15
 

Ähnlich wie Digi securitypres

Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
NTEN
 

Ähnlich wie Digi securitypres (20)

Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 

Mehr von FairSay

Climate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the ChoirClimate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the Choir
FairSay
 

Mehr von FairSay (20)

How to make an online style guide
How to make an online style guideHow to make an online style guide
How to make an online style guide
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
Decoupling
DecouplingDecoupling
Decoupling
 
Responsive digital campaigning
Responsive digital campaigningResponsive digital campaigning
Responsive digital campaigning
 
The robots are our friends
The robots are our friendsThe robots are our friends
The robots are our friends
 
Lived experience in campaigning
Lived experience in campaigningLived experience in campaigning
Lived experience in campaigning
 
Mothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate changeMothers Rise Up: a grassroots movement fighting climate change
Mothers Rise Up: a grassroots movement fighting climate change
 
How to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutesHow to generate viral video ideas in seven minutes
How to generate viral video ideas in seven minutes
 
Building social power
Building social powerBuilding social power
Building social power
 
Ineffecient activism
Ineffecient activismIneffecient activism
Ineffecient activism
 
A year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The RooftopA year of positive news: charting the development and launch to The Rooftop
A year of positive news: charting the development and launch to The Rooftop
 
Plastic-free periods
Plastic-free periodsPlastic-free periods
Plastic-free periods
 
What’s your point?
What’s your point?What’s your point?
What’s your point?
 
Climate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the ChoirClimate Communications: Reaching Beyond the Choir
Climate Communications: Reaching Beyond the Choir
 
Beyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impactBeyond petitions: tools, tactics and user journeys for growth and impact
Beyond petitions: tools, tactics and user journeys for growth and impact
 
Who Is Doing Content Well
Who Is Doing Content WellWho Is Doing Content Well
Who Is Doing Content Well
 
Can We Save The World
Can We Save The World Can We Save The World
Can We Save The World
 
Gentle protest
Gentle protestGentle protest
Gentle protest
 
Introduction to Agile project management for campaigners
Introduction to Agile project management for campaignersIntroduction to Agile project management for campaigners
Introduction to Agile project management for campaigners
 
The ABC of AB testing
The ABC of AB testingThe ABC of AB testing
The ABC of AB testing
 

Kürzlich hochgeladen

Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 

Kürzlich hochgeladen (20)

31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiVasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
31st World Press Freedom Day Conference.
31st World Press Freedom Day Conference.31st World Press Freedom Day Conference.
31st World Press Freedom Day Conference.
 
tOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTRtOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTR
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Panchayath circular KLC -Panchayath raj act s 169, 218
Panchayath circular KLC -Panchayath raj act s 169, 218Panchayath circular KLC -Panchayath raj act s 169, 218
Panchayath circular KLC -Panchayath raj act s 169, 218
 

Digi securitypres

  • 1. Digital Risks and Security for Activists eCampaigning Forum Future Forum April 11th, 2014 Dirk Slater FabRiders- www.fabrider.net @fabrider
  • 2.
  • 3.  Evolution of Information Security  Stuff that makes us vulnerable  The Problem with Online Services and Security Tools  Frameworks for Information Security  Responsibility of Data Collectors  Some tools and resources Today
  • 4.  A personal look at protecting information  The rise of the relational database Evolution of Information Security
  • 5. Stuff that makes us Vulnerable • Email • Search engines • Web browsers • Cloud services • VoIP comms • Social networking • (i.e. everything we do on the internet)
  • 6. MOBILES Stuff That Makes Us Vulnerable
  • 7. The problem with online services If you aren't paying for it you are the product
  • 10. Why are we surprised?
  • 11. The problem with security tools They are often counter-intuitive and not in the reach of mere mortals They often arise suspicion It's an arms race
  • 12.  Information about us is shared everywhere  Online Services are completely insecure and are making money off the information they are collecting  Security tools are problematic So?
  • 13. What about just using a notebook?
  • 14.  How does information itself make people vulnerable? Information Security not Digital Security
  • 15. Three things to remember when sharing information What are your assets? What are the threats? What are the risks?
  • 16. Assets How is the information valuable?
  • 17. What is the threat? • Confidentiality is keeping assets or knowledge about assets away from unauthorized parties. • Integrity is keeping assets undamaged and unaltered. • Availability is the assurance that assets are available to parties authorized to use them. • Consistency is when assets behave and work as expected, all the time. • Control is the regulation of access to assets. • Audit is the ability to verify that assets are secure.
  • 18. What is the Risk? The Likelihood of a Threat Actually Occurring: • Confidentiality • Integrity • Availability • Consi • stency • Control • Verification
  • 19. Responsibility of Data Collection • How can information be traced back to real people? • What are the implications of that?
  • 20. Responsibility of Data Collection • Do you have consent? • Do people understand how you are going to use the data? • Do people understand the risks?
  • 21. Five Questions About Security Solutions*  What assets are you trying to protect?  What are the risks to those assets?  How well does the security solution mitigate those risks?  What other risks does the security solution cause?  What costs and trade-offs does the security solution impose? * from Bruce Shneier's book 'Beyond Fear'
  • 22.  Password Managers  PGP (email encryption)  TOR  The Guardian Project (TOR for Android) Security Tools to Consider
  • 23.  What are the assets, risks, & threats?  Be responsible in your data collection  Consider using security tools after you’ve assessed their impact Remember
  • 24.  EFF’s Surveillance Self Defense - https://ssd.eff.org/risk  Tactical Tech’s Protect Program – https://protect.tacticaltech.org/  Me and My Shadow https://myshadow.org/#  Article 19’s Online Protection Videoshttp://www.article19.org/online-protection/ Resources