没有合适的资源?快使用搜索试试~ 我知道了~
资源详情
资源评论
资源推荐
BASIC INTERNET
SECURITY
Published : 2011-05-09
License : None
1
Introduction
1. Introduction
2. Why use a manual on Internet security?
3. Understanding basic Internet security
2
1. INTRODUCTION
The digital world is changing at a tremendous speed. New communication
technologies open up new possibilities, but by using them you can also expose
yourself, and others, to risks. Many people have trouble assessing these risks
especially with regard to the subject of safe digital communication. This is
particularly true for people working in regimes with high levels of censorship.
However, also in countries considered to be relatively free and uncensored,
your data can be used or misused by others - governments, companies, or
other persons (sometimes even unintended).
How to protect yourself, your sources or your friends? What are safe routes to take? How do
you secure after your personal data? This manual aims to address these issues to help you
choose your own 'level' of safety.
HOW TO TRUST TECHNOLOGY?
When verbally passing a message you usually need to know your contact
persons to know if you can trust them, but you also have to know your
technology a little to know if you can trust it. Technologies can leak or distort
your message just as humans can. Technologies are invested in types of
trust relations: some devices are safer than others, some can be modified,
and some are better avoided.
This book tries to address these different layers by giving hands-on explanations on how to
make your digital communication and data more secure and by providing the reader with a basic
understanding of the concepts of digital communication and data security. It derives from the
following principles:
1. No method is entirely secure;
2. You need to have a basic understanding on how and why technology works to make it
work for you;
3. You need technology for safer communication: either some basic tools, or more
sophisticated equipment, depending on where you're at and where you go.
KEEPING UP TO DATE
Publications about the digital world become outdated fast and a viable
solution today could be serious threat tomorrow. Therefore we created this
book as open source, so it can be easily updated and will be free for others
to update, extend and redistribute. The focus in this book is also on free and
open source tools.
There is a wide range of books dealing with different aspects of secure
communication in a digital age. We have combined our knowledge with existing publications and
our contributions can be re-used and revised as well. This is the advantage of having a growing
pool of excellent reusable content at FLOSS Manuals - its becoming easier in this field to make
books quickly by combining existing materials using this resource.
DIFFERENT USERS, DIFFERENT TOOLS
3
The handbook aims to provide everyone an understanding about how they
can protect themselves and the persons they communicate with. It also aims
to provide insights into the limits of protective measures, so people can
make an informed trade-off.
The manual was a direct response to a workshop given by Greenhost
(http://www.greenhost.nl) to the people from Free Press Unlimited
(http://www.freepressunlimited.org). The workshop made clear that journalists face many
problems with regard to security. This manual therefore addresses the concerns and needs
expressed in that workshop. However, the manual provides information on different layers of
protection and therefore is valuable for other audiences as well. Using the manual does require
some basic knowledge on how to operate a computer with a keyboard, mouse or any other
pointing device.
In the chapter on 'Why to use this manual' you can read more about the reasons for taking more
security measures and how the manual addresses these issues.
HOW WAS THIS BOOK MADE?
This book was written in a Book Sprint. FLOSS Manuals has developed this methodology for the
rapid development of books in amazingly short periods (2-5 days). FLOSS Manuals is an entirely
open and voluntary organisation of some 3000 members. FM has manuals on free software
available in over 30 languages and all for free. You can read more about free software at the
website.
http://www.flossmanuals.net
The idea for the book came from ISP Greenhost from Amsterdam. Besides providing sustainable
hosting solutions they strongly adhere to a free, open and safe web. They bring this in practice
by not logging user information, providing secure options for communication and helping users to
make their computers and usage of the internet safer. For this book they gave a workshop at
the NGO Free Press Unlimited from Hilversum, The Netherlands. Free Press Unlimited
promotes Press Freedom all over the world, educates journalists and helps them securing their
communication. A big part of this book is based on the workshop and the concerns of the
journalists present. For more information check their websites.
https://greenhost.nl
http://www.freepressunlimited.org
Many thanks to Buro 2.0 for providing the space for this Book Sprint. Buro 2.0 is a co-working
space for open source developers and experts. They were extremely generous to offer their
Berlin venue to us for 5 days and made us feel very welcome and well looked after. Check them
out their website.
http://buero20.org/.
The Book Sprint was 4 days long and the full list of onsite participants included:
Adam Hyde (facilitator), Jan Gerber, Dan Hassan, Erik Stein, Sacha van Geffen, Mart van Santen,
Lonneke van der Velden, Emile den Tex and Douwe Schmidt
4
2. WHY USE A MANUAL ON INTERNET
SECURITY?
In the eighties when the Internet was in its infancy, its main usage came from university
students and professors in an atmosphere of implicit trust. This means that security was not the
first thing in mind when the basic uses and functions of the Internet were first developed.
Nowadays the Internet is everywhere both in public and in private life. It has become a vital
means for professional and personal - often confidential - communication. This has required
security enhancements to be added to the various communication methods used on the internet
after it became widely used. A lot of these enhancements are not implemented by default or
require additional configuration.
In addition, most people do not have the appropriate knowledge or skills to secure their internet
usage enough or they might simply feel it they don't need it. Also vendors and providers are to
blame for not pushing more secure technology and methods by default. But maybe you worry
about your login codes being accessed when using wireless networks on a trip, or you want to
securely lock your laptop when leaving it in a hotel. Possibly you need to encrypt your e-mails,
because you have contacts in countries with a high level of internet censorship.
This manual tries to fill that gap by providing some basic knowledge, and also more sophisticated
techniques for those who need them, to make sure that your data is not easily accessed by
others. As a matter of fact, internet security is not that difficult.
WHAT IS SECURITY?
Absolute security does not exist, security is always related to who your adversaries might be.
Security is therefore about informing yourself and assessing the possible risks you, and others
you communicate with, are facing. Make sure you reserve some time to choose the right tools,
install everything properly, and test if it works. Compare it with driving a car: it takes a little bit
of practice, and some judgement on others' behaviour, but as soon you are in control it can
safely get you where you want.
To make a choice between the types of tools you need, it helps to make a distinction between
two basic types of 'threats': undirected threats and directed threats.
Most of the threats we are facing are automated undirected threats and luckily these are also
the easiest to defend against. Unfortunately, we are sometimes also subjected to directed
threats, for which we need some extra safety measures. We will shortly go into these issues and
refer to the appropriate chapters so you can start your way.
UNDIRECTED AND DIRECTED THREATS
Undirected threats are threats that are not directed at you personally, but might still affect you.
Examples include phishing emails and computer virus infections. These methods are always
automated and are just looking to get new victims, that can be everyone. Some schemes can
evolve into a directed threat (for example when responding to e-mails telling you you won the
"Spanish online lottery"). Also unprotected websites, or networks, can be dangerous if you fill in
your login codes or credit card information.
These threats can be compared to walking around in an unknown city, ending up in the wrong
neighborhood and getting mugged. This book aims to be your city guide helping to prevent you to
be at the wrong place at the wrong time. To protect yourself from this type of threats we
recommend you to read at least the sections on General Computer Security, Secure E-mailing
and Secure Browsing. Next to that it is key to keep your wits about you, keep your eyes and
ears open and don't loose your common sense.
5
剩余243页未读,继续阅读
Fremont_book
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 钢琴块2 v3.1.0.1054 Mod.apk
- 蓝桥杯第十一届省赛(第一场)
- 隐马尔可夫实践(生物序列)
- CLShanYanSDKDataList.sqlite
- 2024年度乐材教育春季高中数学教师专业测试答案.docx
- 选择题-数组&类I.docx
- cn-msdn-library-for-visual-studio-2008-service-pack-1-x86-dvd-x1
- cn-msdn-library-for-visual-studio-2008-service-pack-1-x86-dvd-x1
- cn-msdn-library-for-visual-studio-2008-service-pack-1-x86-dvd-x1
- Screenshot_20240517_181056.jpg
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0