Changes

Online Learning

2,408 bytes added, 9 years ago
/* Lesson 6 – Seven steps to better passwords */
You may be concerned that your encrypted volume not only protects your data from unauthorized access but also indicates precisely where you store the information that you most wish to protect. In a tight situation you could be forced to reveal the volume password through intimidation, interrogation and possibly worse.
* [[Destroying temporary files]]
'''Fact: ''' when you delete a file, even after you empty the Recycle bin, the contents of that file remain on your hard drive and can be recovered by anyone who has the right tools and a little luck.
Aside from destroying unwanted data from your digital memory device, you should also consider destroying temporary files.
* [[Backup]]
It is too late to think about having a backup once you lose or break your computer, USB memory stick. Obviously an up to date backup has to created in advance of the catastrophe.
 
* [[Lesson 4 Exercises]]
 
* [[Lesson 4 Further Reading]]
==Lesson 5 – Digital investigative journalism==
The modern journalist must be aware of basic Internet infrastructure and operations. Certain clues accompany every website, email and digital media file – that could reveal information about the sender or the source otherwise hidden from the naked eye. Those who invest a lot of time and energy into maintaining social networks should also be aware of the risks from online profiling that they expose themselves and others to. This lesson will cover methods to identify the location of a particular website, reveal the sender of an email message, view technical details of a digital media file, discuss privacy implications regarding mobile telephone use and list several precautions for using social media platforms, in particular Facebook.
 
* [[IP forensics]]
* [[Email spoofing]]
We are prone to identify and authenticate email messages by the sender's name and email address. This Lesson will help you analyse and validate the real sender of a received email message.
* [[Data Forensics]]
Just like every email message records the IP address of the server it is sent from, so does every digital document contain details about the time it was created, the device that created it and other useful information.
* [[Profiling]]
In the physical world we are identified by passport to our government and by recognition to our friends. A drivers licence, a social security or tax file number and our reputation serve as distinguishing features of our identity and associations.
* [[Mobile profiling and surveillance]]
You may have heard or already know that mobile telecomunnications are insecure by default. Did you know that your geigraphical location can be pinpointed thanks the phone in your pocket?
 
* [[Lesson 5 Exercises]]
 
* [[Lesson 5 Further Reading]]
==Lesson 6 – Seven steps to better passwords==
A password is often the first (and last) line of defense – protecting unauthorized access to your computer or an Internet account. A password is like a key to a door. You may have several different keys for your home, your office, your car and your safe. None of the locks are the same and you have a collection of different keys to open them. The same should apply to your passwords. Each account should have its own strong password. The definition of a strong password is one that cannot easily be guessed, cracked or stolen by an attacker. This chapter explains how to create and remember strong passwords and how not to lose them!
 
* [[Better Passwords]]
 
* [[Lesson 6 Exercises]]
 
* [[Lesson 6 Further Reading]]
252
edits