1 / 23

Creating enabling environment

Creating enabling environment. Security risks and how to mitigate them. Crucially important. 1) Our physical safety 2) Secure communication.

Download Presentation

Creating enabling environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Creating enabling environment Security risks and how to mitigate them

  2. Crucially important 1) Our physical safety 2) Secure communication

  3. UK: Activist hacks into abortion clinic’s website and threatens to release ‘database of contacts’DAILY MAIL, PUBLISHED: 00:22 GMT, 9 March 2012 | UPDATED: 03:36 GMT, 9 March 2012 An activist claims to have hacked into the website of Britain’s largest abortion clinic [BPAS]. He claims to have the ‘entire database and contact details’ of women who had contacted the British Pregnancy Advisory Service and warned that information would be released today. …

  4. “Around 26,000 attempts to break into our website were made over a six hour period, but the hacker was unable to access any medical or personal information regarding women who had received treatment at bpas. 'The website does store details (names, addresses and phone numbers) of people who have requested information from bpas via the website, including those making personal inquiries as well as health and education professionals, the media and students.” Ann Furedi

  5. Website of 28 de Septiembre Campaign in LAC

  6. WGNRR website registration page

  7. How to protect your data?

  8. PASSWORDS Make them: • Long • Complex • Practical • Not personal • Unique • Keep them a secret and keep them fresh E.g. R3PR0DUCT!Ve

  9. ENCRYPTION Encrypting your information is a bit like keeping it in a locked safe. Only those who have a key or know the lock's combination (an encryption key or password, in this case) can access it. Software: TrueCrypt, FreeOTFE, The FREE CompuSec, Steganos LockNote Note: Please bear in mind that the use of encryption is illegal in some countries (Russia, China, Myanmar etc)

  10. KEEPING YOUR ONLINE COMMUNICATION PRIVATE All Web addresses normally begin with the letters HTTP, as can be seen in the example below: E.g. Yahoo, Hotmail When you are visiting a secure website, its address will begin with HTTPS. E.g. Gmail, RiseUP

  11. HOW TO DESTROY SENSITIVE INFORMATION Eraser is a free and open-source secure deletion tool that is extremely easy to use. You can wipe files with Eraser in three different ways: by selecting a single file, by selcting the contents of the Recycle Bin, or by wiping all unallocated space on the drive. 

  12. MORE INFO • How to remain anonymous and bypass censorship on the Internet • How to destroy sensitive information • How to use mobile phones as securely as possible • How to encrypt your instant messaging …. And MUCH more: https://security.ngoinabox.org/en

  13. Physical security

  14. Sybil, a grassroots activist in Nigeria I got an assassination threat call by someone who called himself a killer some time in 2011. He told me that someone paid him to kill me. …

  15. Cycle of Violations of Women’s Human Rights

  16. Useful resources: Claiming Rights, Claiming Justice. A Guidebook onWomen Human Rights Defenders http://www.defendingwomen-defendingrights.org/pdf2008/EN_Claiming_Rights.pdf

  17. Useful resources: PROTECTION MANUAL FOR HUMAN RIGHTS DEFENDERS http://www.frontlinedefenders.org/manuals/protection

  18. Emergency Response Team

  19. Thank you!

More Related