Digital Security

Introduction

Welcome to Lesson Three of Nabz-Iran’s course on digital security. In the previous two lessons, we discussed how to identify online threats and computer security. Now it’s time to discuss the safety of information and data in computers and smart devices. Whether you are a social/political activist, a journalist, or an ordinary citizen, the digital devices you use contain information that is useful for your everyday work and everyday life. It’s quite likely that there are attackers out there who may wish to gain access to this information. This is why you should protect your information and data.

Attackers can gain access to your information through two possible methods.

  1. The first method is to physically steal your computer/smart device or to record from it.
  2. The second method is to gain access to the information electronically, either via the Internet or other communication means.

A good security plan must take both of these methods into account.

You should protect your computer in a way that makes access to it difficult for attackers from afar, as well as making it difficult for these attackers to access your computer’s information, should it fall in their hands, by disguising and encrypting this information.

A good security plan also carefully considers a place for the storage of information. Depending on your usage and any security concerns, you can store your information on personal computers, portable drives, or online storage clouds. These options all have their own strengths and weaknesses, and you’ll find the right option for you by weighing the pros and cons for your personal situation.

For more in-depth reading on the topic of security plans, you can refer to this guide: Digital Security and Privacy for Human Rights Defenders. The guide, however, also goes into great details on the security discussion, beyond just online security.