Difference between revisions of "Digital Security QA"
| Line 2: | Line 2: | ||
__NOEDITSECTION__ | __NOEDITSECTION__ | ||
| − | == | + | This is an interactive guide for those looking for an answer to their digital security question. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution. |
| + | |||
| + | ==I want to protect my...== | ||
| + | |||
| + | {{#ask: [[Category:Top Level Scenario Task]]|format=ul }} | ||
| + | |||
| + | |||
| + | ==Q&A Meta Data== | ||
* [[DigsecInsecurity|Threat Categories]] | * [[DigsecInsecurity|Threat Categories]] | ||
| Line 9: | Line 16: | ||
* [[Scenario Services|Services]] | * [[Scenario Services|Services]] | ||
* [[digsecFAQ|FAQ]] | * [[digsecFAQ|FAQ]] | ||
| − | |||
| − | |||
| − | |||
| − | |||
Revision as of 23:56, 17 September 2015
This is an interactive guide for those looking for an answer to their digital security question. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution.
I want to protect my...
- Access to the Web
- Computer
- Data
- FAQ
- Identity or Location
- My Website
- Online Conversations
- Phone
- Social Network