Difference between revisions of "Online Learning"

Ben (Talk | contribs)
(Lesson 5 – Digital investigative journalism)
Ben (Talk | contribs)
(Lesson 6 – Seven steps to better passwords)
 
(7 intermediate revisions by the same user not shown)
Line 64: Line 64:
 
You may be concerned that your encrypted volume not only protects your data from unauthorized access but also indicates precisely where you store the information that you most wish to protect. In a tight situation you could be forced to reveal the volume password through intimidation, interrogation and possibly worse.  
 
You may be concerned that your encrypted volume not only protects your data from unauthorized access but also indicates precisely where you store the information that you most wish to protect. In a tight situation you could be forced to reveal the volume password through intimidation, interrogation and possibly worse.  
 
* [[Destroying temporary files]]
 
* [[Destroying temporary files]]
Fact: when you delete a file, even after you empty the Recycle bin, the contents of that file remain on your hard drive and can be recovered by anyone who has the right tools and a little luck.  
+
'''Fact:''' when you delete a file, even after you empty the Recycle bin, the contents of that file remain on your hard drive and can be recovered by anyone who has the right tools and a little luck.  
 
Aside from destroying unwanted data from your digital memory device, you should also consider destroying temporary files.
 
Aside from destroying unwanted data from your digital memory device, you should also consider destroying temporary files.
 
* [[Backup]]
 
* [[Backup]]
 
It is too late to think about having a backup once you lose or break your computer, USB memory stick. Obviously an up to date backup has to created in advance of the catastrophe.
 
It is too late to think about having a backup once you lose or break your computer, USB memory stick. Obviously an up to date backup has to created in advance of the catastrophe.
 
  
 
* [[Lesson 4 Exercises]]
 
* [[Lesson 4 Exercises]]
Line 79: Line 78:
 
* [[IP forensics]]
 
* [[IP forensics]]
 
* [[Email spoofing]]
 
* [[Email spoofing]]
 +
We are prone to identify and authenticate email messages by the sender's name and email address. This Lesson will help you analyse and validate the real sender of a received email message.
 
* [[Data Forensics]]
 
* [[Data Forensics]]
 +
Just like every email message records the IP address of the server it is sent from, so does every digital document contain details about the time it was created, the device that created it and other useful information.
 
* [[Profiling]]
 
* [[Profiling]]
 +
In the physical world we are identified by passport to our government and by recognition to our friends. A drivers licence, a social security or tax file number and our reputation serve as distinguishing features of our identity and associations.
 
* [[Mobile profiling and surveillance]]
 
* [[Mobile profiling and surveillance]]
 
+
You may have heard or already know that mobile telecomunnications are insecure by default. Did you know that your geigraphical location can be pinpointed thanks the phone in your pocket?
  
 
* [[Lesson 5 Exercises]]
 
* [[Lesson 5 Exercises]]
Line 89: Line 91:
  
 
==Lesson 6 – Seven steps to better passwords==
 
==Lesson 6 – Seven steps to better passwords==
 +
A password is often the first (and last) line of defense – protecting unauthorized access to your computer or an Internet account. A password is like a key to a door. You may have several different keys for your home, your office, your car and your safe. None of the locks are the same and you have a collection of different keys to open them. The same should apply to your passwords. Each account should have its own strong password. The definition of a strong password is one that cannot easily be guessed, cracked or stolen by an attacker. This chapter explains how to create and remember strong passwords and how not to lose them!
 +
 
* [[Better Passwords]]
 
* [[Better Passwords]]
  

Latest revision as of 22:11, 28 May 2014

Introduction

Lesson 1 - The Internet and its Pitfalls

Lesson 2 – Privacy! On the Internet?

Lesson 3 – Goodbye Censorship!

Lesson 4 - Digital information management

Lesson 5 – Digital investigative journalism

Lesson 6 – Seven steps to better passwords

Last modified 11 years ago
Cancel

Help improve this page!

Cancel

Keep track of this page and all changes to it.