creating enabling environment
DESCRIPTION
Creating enabling environment. Security risks and how to mitigate them. Crucially important. 1) Our physical safety 2) Secure communication. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/1.jpg)
Creating enabling environment Security risks and how to mitigate them
![Page 2: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/2.jpg)
Crucially important
1) Our physical safety2) Secure communication
![Page 3: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/3.jpg)
UK: Activist hacks into abortion clinic’s website and threatens to release ‘database of contacts’DAILY MAIL, PUBLISHED: 00:22 GMT, 9 March 2012 | UPDATED: 03:36 GMT, 9 March 2012
An activist claims to have hacked into the website of Britain’s largest abortion clinic [BPAS].He claims to have the ‘entire database and contact details’ of women who had contacted the British Pregnancy Advisory Service and warned that information would be released today.…
![Page 4: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/4.jpg)
“Around 26,000 attempts to break into our website were made over a six hour period, but the hacker was unable to access any medical or personal information regarding women who had received treatment at bpas.
'The website does store details (names, addresses and phone numbers) of people who have requested information from bpas via the website, including those making personal inquiries as well as health and education professionals, the media and students.”
Ann Furedi
![Page 5: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/5.jpg)
![Page 6: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/6.jpg)
Website of 28 de Septiembre Campaign in LAC
![Page 7: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/7.jpg)
WGNRR website registration page
![Page 8: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/8.jpg)
How to protect your data?
![Page 9: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/9.jpg)
PASSWORDS
Make them:•Long•Complex•Practical•Not personal•Unique•Keep them a secret and keep them fresh
E.g. R3PR0DUCT!Ve
![Page 10: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/10.jpg)
ENCRYPTION
Encrypting your information is a bit like keeping it in a locked safe. Only those who have a key or know the lock's combination (an encryption key or password, in this case) can access it.
Software: TrueCrypt, FreeOTFE, The FREE CompuSec, Steganos LockNote
Note: Please bear in mind that the use of encryption is illegal in some countries (Russia, China, Myanmar etc)
![Page 11: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/11.jpg)
KEEPING YOUR ONLINE COMMUNICATION PRIVATE
All Web addresses normally begin with the letters HTTP, as can be seen in the example below:
E.g. Yahoo, HotmailWhen you are visiting a secure website, its address will begin
with HTTPS.
E.g. Gmail, RiseUP
![Page 12: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/12.jpg)
![Page 13: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/13.jpg)
HOW TO DESTROY SENSITIVE INFORMATION
Eraser is a free and open-source secure deletion tool that is extremely easy to use. You can wipe files with Eraser in three different ways: by selecting a single file, by selcting the contents of the Recycle Bin, or by wiping all unallocated space on the drive.
![Page 14: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/14.jpg)
MORE INFO1) How to remain anonymous and bypass censorship on the
Internet2) How to destroy sensitive information3) How to use mobile phones as securely as possible4) How to encrypt your instant messaging….And MUCH more:
https://security.ngoinabox.org/en
![Page 15: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/15.jpg)
![Page 16: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/16.jpg)
![Page 17: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/17.jpg)
Physical security
![Page 18: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/18.jpg)
Sybil, a grassroots activist in NigeriaI got an assassination threat call by someone who called himself a killer some time in 2011. He told me that someone paid him to kill me.…
![Page 19: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/19.jpg)
Cycle of Violations of Women’s Human Rights
![Page 20: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/20.jpg)
Useful resources: Claiming Rights, Claiming Justice. A Guidebook onWomen Human Rights Defendershttp://www.defendingwomen-defendingrights.org/pdf2008/EN_Claiming_Rights.pdf
![Page 21: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/21.jpg)
Useful resources:
PROTECTION MANUAL•FOR
HUMAN RIGHTS
DEFENDERS
http://www.frontlinedefenders.org/manuals/protection
![Page 22: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/22.jpg)
Emergency Response Team
![Page 23: Creating enabling environment](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56812b20550346895d8f1e03/html5/thumbnails/23.jpg)
Thank you!