2.5 KiB
Autodifesa
digitale
A big thanks to the
_TO hacklab
for the source of this presentation.
--
GOAL
-
When you leave the squat, you should have a better idea of what it means to defend yourself when you have a digital presence.
-
The slides are meant to be used as a web resource, so there is a lot of text. I'll try not to read ¯_(ツ)_/¯
--
Threat model
You can't protect yourself from what you're not aware of.
- Who is my enemy? (my parents, my significant other, my employer, interpol, the freemasonry 𓁿) ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
- What am I protecting? (my identity, my sexual preferences, my ideas, my spicy text ㆆ _ ㆆ)
- How can I be attacked? i.e. my threat categories =͟͟͞͞(꒪ᗜ꒪‧̣̥̇)
--
Practical example 1
Selling pot in high school
Who is my enemy?
- Law Enforcement
- The school
- My parents
What am I protecting?
- My parents
- My friends and buyers
- My future
notes: proporre una riflessione collettiva su uno scenario
--
Threat categories
A framework to answer the question "how can I be attacked?"
--
Spoofing
The act to violate authenticity. Examples:
- TODO
IMMAGINI ORSO?
--
Repudiation
TODO
--
Tampering
TODO
--
Information Disclosure
The act to violate confidentiality. Examples:
- TODO
--
Denial of Service
The act to violate availability. Examples:
- TODO
--
Elevation of privileges
The act to violate authorization. Examples:
- TODO
--