<-- Go Back
An Insight to Digital Privacy and Security Resources
What is Security?
In simple words it is about protection. Earlier, we had physical security to protect our valuable assets in the physical world. But when we move more toward the cyber world, we need a new set of software and tools to protect our data and privacy.
The three pillars of security are :
CIA Triad
Confidentiality — this focuses on protecting the “Read” operation. You do not want unauthorized people to read your confidential information, for example, your credit card number, your passwords or payroll amount.
Integrity — this focuses on protecting the “Write” operation. You do not want to unauthorized people to modify your data. For example, you do not want someone to withdraw money from your bank account without your permission.
Availability — this means the systems and data are always accessible when you need them. For example, an online banking system or an online shopping site should always be on.
Powerful Tool-kits available today
Mozilla’s Internet Health Report Online Privacy and Security brief or O A Healthy Internet is Secure and Private. The Internet only stays healthy if we trust it as a safe place - to explore, transact, connect, and create.
MyShadow helps you take control of your data. What is a Digital Shadow ? Watch this to understand. MyShadow.org offers practical ways to take back your privacy online.
Electronic Frontier Foundation (EFF). The leading nonprofit defending digital privacy, free speech, and innovation. Defending your rights in the digital world. The Electronic Frontier Foundation is an independent non-profit working to protect online privacy for nearly thirty years.
Surveillance Self-Defense Tips, Tools and How-tos for Safer Online Communications
Security Education Companion A free resource for digital security educators. SEC is a resource for people teaching digital security to their friends and neighbors.
Privacy Badger Privacy Badger automatically learns to block invisible trackers.
Tor Project We believe everyone should be able to explore the internet with privacy. We advance human rights and defend your privacy online through free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.
DEFEND and DETOX An amazing step by step guide to running a digital safety class. This curriculum was created for a Defend and Detox event for women in New York City to teach the digital women how to protect herself online. The curriculum can be adapted for women anywhere.
Data Security Exchange Civil society organizations face a number of different threats. We link them with digital security providers to help. Keeping US civil society safe from digital attack.
Speak Up & Stay Safe(r) A Guide to Protecting Yourself From Online Harassment. A Guide to Protecting Yourself From Online Harassment.
Security in a Box Digital security tools and tactics. The Tactics Guides in this toolkit cover basic principles, including advice on how to use social media and mobile phones more safely. The Tool Guides offer step-by-step instructions to help you install, configure and use some essential digital security software and services.
Accessnow Access Now defends and extends the digital rights of users at risk around the world. By combining direct technical support, comprehensive policy engagement, global advocacy, grassroots grantmaking, and convenings such as RightsCon, we fight for human rights in the digital age.
Data Detox kits Small steps to change your habits and reduce data traces. The Data Detox Kit is an 8-day step-by-step guide on how to reduce data traces online. Each day has a different focus — from cleaning up your apps, to social media, to your phone’s connectivity — informing you of the data processes, walking you through some changes you can make, and giving you a small challenge at the end of each day.
Open Web Application Security Project (OWASP) A worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible in order to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide.
Motherboard A Practical Checklist For Leading Your First Training.Do you want to teach people about infosec, opsec and how to stay safe online? Here’s where to start.
Articles Worth Reading
How To Make Sure Your Home Address Isn’t Easily Available Online How To Make Sure Your Honest to God Actual Home Address Isn’t Easily Available Online…
What is Doxing and how to Prevent it from Happening - So What the Hell Is Doxxing? Remember Gamergate? Or when the identity of that dentist who killed Cecil the Lion was posted?…
How to Use Signal Without Giving Out Your Phone Number Just a few years ago, sending encrypted messages was a challenge. Just to get started, you had to spend hours following…
Don’t like being tracked online? Set up a VPN for free How to set up a VPN in 10 minutes for free (and why you urgently need one)
A DIY Guide to Feminist Cybersecurity Your casual internet browsing yields a treasure trove of personal data for anyone who can see what you’re doing…
Phishing’s No Phun; Here’s How To Resist The Bait Likely you’ve heard about the massive phishing scam of the week. Some malicious human…
Equality Labs Privacy + Security Curriculum Guide This curriculum was co-developed by qualified digital security trainers of color who have experience working in…
How to Run a Rogue Government Twitter Account With an Anonymous Email Address and a Burner Phone For this exercise, I decided to pick a highly controversial political topic: Facts. I believe that what we know about…
Journalists in Distress: Securing Your Digital Journalists in Distress: Securing Your Digital Life Civil liberties groups condemn the Trump admin’s indictment of Julian Assange. While the indictment of Julian Assange centers on an alleged attempt to break a password-an attempt that was not…
Getting Started with Digital Security Security Tips Every Signal User Should Know. There are dozens of messaging apps for iPhone and Android, but one in particular continues to stand out in the crowd…
Encrypting Your Laptop Like You Mean It TIME AND AGAIN, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass…
Schneier on Security Micah Lee’s work at The Intercept
Free professional resources, conferences, podcasts and webinars
Conferences :
OWASP Seasides
OWASP Global Appsec
DEFCON
HOPE
Toor Camp
CyberSec Summit
ENIGMA
CyberSec Manchester
SANS
RSA Conf
HITB SecConf
IEEE Security
BlackHat(My fav)
USENIX CONFS
Podcasts :
Daily Stormcasts by SANS Internet Stormcasts
Crypto Gram Security Podcasts
The Hated One
The Cyberwire
Risky Business
Security Now with Steve Gibson
Down the Security Rabbit Hole
Quick Resources :
Ethical Hacker
Bright Talk
FOIA Feeds
Cybrary
Freedom Tracker
Haven
Secure Drop
Common Sense
Cyberwise
EC Council