An insight to Digital Privacy and Security Resources

Kai Iyer
Apr 19 · 6 min read

What is security?

The three pillars of security are :

CIA triad
  • Confidentiality — this focuses on protecting the “Read” operation. You do not want unauthorized people to read your confidential information, for example, your credit card number, your passwords or payroll amount.
  • Integrity — this focuses on protecting the “Write” operation. You do not want to unauthorized people to modify your data. For example, you do not want someone to withdraw money from your bank account without your permission.
  • Availability — this means the systems and data are always accessible when you need them. For example, an online banking system or an online shopping site should always be on.

Powerful Tool-kits available today

MyShadow helps you take control of your data. What is a Digital Shadow ? Watch this to understand.

Electronic Frontier Foundation (EFF). The leading nonprofit defending digital privacy, free speech, and innovation.

Surveillance Self-Defense. Provides Tips, Tools and How-tos for Safer Online Communications. We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years.

Security Education Companion. A free resource for digital security educators. SEC is a resource for people teaching digital security to their friends and neighbors.

Privacy Badger. Privacy Badger automatically learns to block invisible trackers.

Tor Project. We believe everyone should be able to explore the internet with privacy.We advance human rights and defend your privacy online through free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.

DEFEND and DETOX. An amazing step by step guide to running a digital safety class. This curriculum was created for a Defend and Detox event for women in New York City to teach the digital women how to protect herself online. The curriculum can be adapted for women anywhere.

Mozilla Privacy Toolkit Handout.

Data Security Exchange. Civil society organizations face a number of different threats. We link them with digital security providers to help.

Speak Up & Stay Safe(r): A Guide to Protecting Yourself From Online Harassment

Security in a Box — Digital security tools and tactics. The Tactics Guides in this toolkit cover basic principles, including advice on how to use social media and mobile phones more safely. The Tool Guides offer step-by-step instructions to help you install, configure and use some essential digital security software and services.

Accessnow. Access Now defends and extends the digital rights of users at risk around the world. By combining direct technical support, comprehensive policy engagement, global advocacy, grassroots grantmaking, and convenings such as RightsCon, we fight for human rights in the digital age.

Data Detox kits: Small steps to change your habits and reduce data traces. The Data Detox Kit is an 8-day step-by-step guide on how to reduce data traces online. Each day has a different focus — from cleaning up your apps, to social media, to your phone’s connectivity — informing you of the data processes, walking you through some changes you can make, and giving you a small challenge at the end of each day.

Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible in order to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide.

Motherboard. A Practical Checklist For Leading Your First Training.Do you want to teach people about infosec, opsec and how to stay safe online? Here’s where to start.


Articles worth Reading

What is Doxing and how to Prevent it from Happening

How to Use Signal Without Giving Out Your Phone Number

Don’t like being tracked online? Set up a VPN in 5 min for free

A DIY Guide to Feminist Cybersecurity

Phishing’s No Phun; Here’s How To Resist The Bait

Equality Labs Privacy + Security Curriculum Guide

How to Run a Rogue Government Twitter Account With an Anonymous Email Address and a Burner Phone

Journalists in Distress: Securing Your Digital Life

Getting Started with Digital Security

Encrypting Your Laptop Like You Mean It

Micah Lee’s work at The Intercept.


Coinmonks

Coinmonks is a technology-focused publication embracing decentralize technologies. We are Non-profit and education is our core value. Learn, Build and thrive. Our other project— https://coinmonks.com, https://cryptofi.co, https://coincodecap.com

Kai Iyer

Written by

Kai Iyer

Break the limits !!!

Coinmonks

Coinmonks

Coinmonks is a technology-focused publication embracing decentralize technologies. We are Non-profit and education is our core value. Learn, Build and thrive. Our other project— https://coinmonks.com, https://cryptofi.co, https://coincodecap.com