Online Security
This section points to materials which will be of use to both those new to online security and privacy issues, as well to more advanced users. Topics covered include viruses, network and server security, encryption, and Internet security in the workplace.
Secure Computing and Online Communications - Backing up
Backing up your data
Developed by: OneNorthWest: Activist Toolkit Type of resource: Web article Target audience: General Cost: Free access
This guide from OneNorthWest outlines the hardware, software and procedures necessary to back up the key data from your computers effectively.
Dhttp://www.onenw.org/bin/page.cfm/pageid/8
Backing Up Your Data
Developed by: ICT Hub KnowledgeBase Type of resource: Web article Target audience: General Cost: Free access
"Overview of options available for backing up your data."
Dhttp://www.icthubknowledgebase.org.uk/backingupyou rdata
Backing Up Your Data
Developed by: TechSoup Type of resource: Web article Target audience: General Cost: Free access
"How effective would your nonprofit be if your email, word-processing documents, and contact databases were wiped out completely? How many hours would it take to rebuild the lost information from scratch?" ONE/Northwest and Kevin Lo look at the best backup practices.
Dhttp://www.techsoup.org/learningcenter/software/pa ge6089.cfm
Developing a Backup Strategy
Developed by: Lasa Information Systems Type of resource: Web article Target audience: General Cost: Free access
"Having a good data backup strategy can guard against data loss, support compliance with Data Protection regulations and protect your organisation from disaster. However, knowing where to start and what to buy can often be confusing. In this guide, we show how to develop a backup strategy, analyse the pros and cons of backup hardware and take a brief look at some of the software utilities out there to help you manage the backup process."
Dhttp://www.icthubknowledgebase.org.uk/backupstrate gy
How File Compression Works
Developed by: HowStuffWorks Type of resource: Web article Target audience: General Cost: Free access
File compression is a central component of most back-up tools. This article explains in simple terms how file compression works.
Dhttp://www.howstuffworks.com/file-compression.htm/ printable
Mass Storage
Developed by: Tom’s Hardware Guide Type of resource: Web site Target audience: General Cost: Free access
Articles on storage devices such as external hard drives, CD and DVD burners and flash drives.
Dhttp://www.tomshardware.com/storage/
Oh no! My laptop was stolen and I lost all my critical data!
Developed by: Kabissa Type of resource: Web guide Target audience: General Cost: Free access
This short guide from Kabissa looks at "a few simple things you can do to keep your important computer files safe, at little or no cost to your organization."
Dhttp://www.kabissa.org/newsletter/mimi/backups.htm l
The No-Excuses Guide to Automated Online Backup
Developed by: TechSoup Type of resource: Web article Target audience: General Cost: Free access
"Backing up critical files is like exercising: everyone knows they should do it, but most people don't do it enough. A remedy for the files is automated online backup." This TechSoup article show you how.
Dhttp://www.techsoup.org/learningcenter/internet/pa ge5813.cfm
Secure Computing and Online Communications - Password management
Protect yourself: Passwords
Developed by: Learn the Net Type of resource: Web guide Target audience: General Cost: Free access
Basic password tips from Learn the Net.
Dhttp://www.learnthenet.com/english/html/72passwd.h tm
Secure Computing and Online Communications - Viruses, spyware and adware
AntiVir
Developed by: AntiVir Type of resource: Software Target audience: General Cost: Free access
AntiVir PersonalEdition Classic is free for individual and private use. AntiVir runs on Windows 98/Me and XP (XP&2000&NT) and Linux/OpenBSD/FreeBSD/Solaris.
AVG Free for Linux
Developed by: Grisoft Type of resource: Software Target audience: General Cost: Free access
AVG Free for Linux is the Linux desktop version of the popular AVG Free antivirus tool. Although Linux viruses are less prevalent than viruses targeting Windows, Linux is not immune to malware threats, and as the use of Linux grows the risks increase.
Dhttp://free.grisoft.com/doc/1
Crash Course: Spyware
Developed by: Whatis?com Type of resource: Web guide Target audience: General Cost: Free access
Introduction to spyware and what you can do to prevent it, and links to reviews of spyware removal tools.
Dhttp://whatis.techtarget.com/definition/0,,sid9_gc i905446,00.html#expert_technical_advice
Removing Spyware, Viruses, and Other Malware from Windows
Developed by: TechSoup Type of resource: Web article Target audience: General Cost: Free access
Short article by Zachary Mutrux introducing minor security incident response.
Dhttp://www.techsoup.org/howto/articlepage.cfm?Arti cleId=539
Spyware: They came from cyberspace
Developed by: Houston Chronicle Type of resource: Web guide Target audience: General Cost: Free access
A step-by-step guide from the Houston Chronicle to avoiding and removing spyware from Windows computers.
Dhttp://www.chron.com/disp/story.mpl/tech/2496493.h tml
SpywareInfo
Developed by: SpywareInfo Type of resource: Web site Target audience: General Cost: Free access
This excellent site offers a newsletter, forums and other resources to keep you up-to-date on spyware and related malware.
Viruslist
Developed by: VirusPool Type of resource: Web site Target audience: General Cost: Free access
Computer viruses are "named" by vendors of anti-virus software. The same virus may be given different names by different vendors, which can make finding information difficult. The VirusPool Viruslist addresses this problem by offering a database of virus name aliases. The database is not comprehensive, but it is still a helpful starting point.
How Computer Viruses Work
Developed by: HowStuffWorks Type of resource: Web guide Target audience: General Cost: Free access
Basic introduction to what viruses are, how they work, and
Dhttp://computer.howstuffworks.com/virus.htm
Viruses
Developed by: Rutgers University Writing Programme Type of resource: Web guide Target audience: General Cost: Free access
Basic introduction to viruses from Rutgers University. Although it dates back to 2002, the guide's clear, basic explanation of what viruses are and how to deal with them is still relevant.
Dhttp://getit.rutgers.edu/tutorials/viruses/index.h tml
Webwise: Viruses
Developed by: BBC Webwise Type of resource: Animated tutorial Target audience: General Cost: Free access
Animated introduction providing a basic introduction to viruses and how to protect yourself from them. A text-only version is available for people who cannot access the animated version.
Dhttp://www.bbc.co.uk/webwise/course/safety/virus/v irus.shtml
What are viruses, worms, and trojans?
Developed by: Microsoft Type of resource: Web guide Target audience: General Cost: Free access
Basic guide from Microsoft looking at what viruses, worms and trojans are, how they spread, and how to protect your system against them.
Dhttp://www.microsoft.com/security/articles/virus10 1.asp
Secure Computing and Online Communications - Firewalls
Firewalls and You
Developed by: TechSoup Type of resource: Web article Target audience: General Cost: Free access
A basic introduction to firewalls from TechSoup.
Dhttp://www.techsoup.org/articlepage.cfm?articleid= 90&topicid=3&btcfile=articlepage90
Home PC Firewall Guide
Developed by: Home PC Firewall Guide Type of resource: Web site Target audience: General Cost: Free access
The Home PC Firewall Guide aims to provide easy access to basic information about internet security and privacy, along with independent third-party reviews of internet security and privacy products for home, telecommuting, and SOHO (small office, home office) end-users.
Dhttp://www.firewallguide.com/
How firewalls work
Developed by: HowStuffWorks Type of resource: Web guide Target audience: General Cost: Free access
Short guide to what firewalls are and how they work.
Dhttp://computer.howstuffworks.com/firewall.htm
Secure Computing and Online Communications - Privacy, anonymity, and encryption
AbsoluteShield File Shredder
Developed by: AbsoluteShield Type of resource: Software tool Target audience: General Cost: Free access
Windows does not physically remove deleted files from your hard disk. AbsoluteShield File Shredder erases files completely, making them impossible to recover.
Dhttp://www.sys-shield.com/fileshredder.htm
Ciphire
Developed by: Ciphire Type of resource: Software tool Target audience: General Cost: Free access
Ciphire Mail is an e-mail encryption tool which works in conjunction with your regular e-mail client. It encrypts and decrypts e-mail messages, and can digitally sign each message to provide authentication and guard against identity theft. Versions for Windows 2000/XP, Linux, and Mac OS X are available.
Hushmail
Developed by: APC Type of resource: Trainers' kit Target audience: General, Trainers Cost: Free access
MMTK introduction to the Hushmail secure web-based e-mail.
Dhttp://www.itrainonline.org/itrainonline/mmtk/secu rity.shtml
Protection of Privacy and Personal Data in a Networked Society
Developed by: Bridges.org Type of resource: Trainers' notes Target audience: Trainers Cost: Free access
Lesson outline and links for trainers.
Dhttp://www.bridges.org/techguide/lessons/privacy.h tml
Secure Computing and Online Communications - Data destruction
Data Removal Recommendations
Developed by: Brown University Type of resource: Web article Target audience: General Cost: Free access
"For the general user, the delete or format command appears to be the logical method of removing unwanted data files. These methods, however, are like sweeping something under the carpet: you may not be able to see it, but it's still there." This guide from Brown University explains why deleting information does not remove it from your hard driv, and points to data destruction tools and readings.
Dhttp://www.brown.edu/Facilities/CIS/Doc/datarmv.ht ml
Secure Computing and Online Communications - In the workplace
An Introduction to Internet Security in the Workplace
Developed by: TechSoup Type of resource: Web article Target audience: General Cost: Free access
Short introduction to topics such as password, web and e-mail security by Susan Tenby.
Dhttp://www.techsoup.org/articlepage.cfm?ArticleId= 198&topicid=5
An Introduction to Information Risk Assessment
Developed by: Sans Institute Type of resource: PDF Target audience: General Cost: Free access
Vishal Visintine takes you through the basics of identifying and assessing assets, threats, vulnerabilities and risks in your organization, and at creating an action plan to address them.
Dhttp://www.sans.org/reading_room/whitepapers/audit ing/1204.php
Information security in the workplace: what every user should know
Developed by: Purdue University Type of resource: PDF guide Target audience: General Cost: Free access
This guide by Melissa J. Dark provides an excellent basic overview of threats to security and practices which promote computer security. Although published in 2000 the principles it outlines are still valid today.
Dhttp://www.cerias.purdue.edu/training_and_awarenes s/downloads/information_security_workplace_preview .pdf
Information security planning
Developed by: APC Type of resource: MS Word files Target audience: General, Trainers Cost: Free access
Developed by APC member Ungana-Afrika, this ItrainOnline MMTK unit aims to help NGOs plan for more secure use of information and communications technologies.
Dhttp://www.itrainonline.org/itrainonline/mmtk/secu rity.shtml
Securing Public Access PCs Without Shutting Out Users
Developed by: TechSoup Type of resource: Web guide Target audience: General Cost: Free access
A librarian experienced in maintaining a public access network provides basic suggestions for maintenance and security to ensure that public terminals are functioning optimally and so that all citizens can freely and safely access information. Though initially written for librarians and library systems, the information is relevant for community telecenters.
Dhttp://www.techsoup.org/howto/articles/techplan/pa ge4252.cfm?cg=searchterms&sg=secure
Secure Computing and Online Communications - For networks and servers
LinuxChix Security Lessons
Developed by: LinuxChix.org Type of resource: Web site and mailing lists. Target audience: General, Women Cost: Free access
This free security course is presented via a mailing list; the lessons are also available on the LinuxChix web site. Aimed primarily at women, the LinuxChix community offers mailing lists, annotated links to resources, and free online courses.
Dhttp://www.linuxchix.org/content/courses/security/
Secure Computing and Online Communications - Wireless
Five Tips for Secure Wireless Web Surfing
Developed by: TechSoup Type of resource: Web guide Target audience: General Cost: Free access
How to stay safe when using a public wireless hotspot
Dhttp://www.techsoup.org/learningcenter/connections /page5998.cfm
Wi-Fi for dummies: Securing network access while on the run
Developed by: The Register Type of resource: Web article Target audience: General Cost: Free access
If you are chatting, emailing, or just browsing while at an wireless internet hotspot, you'll want to read this article to understand the risks and ways to protect your personal information when you're on the go. The article provides recommendations on the most secure software to use, as well as plugins to further enhance security. It looks at web browsers, instant messenger services, and email.
Dhttp://www.theregister.co.uk/2006/02/10/wifi/
Wi-Fi horrors: Tales from the cryptographer
Developed by: CNet Type of resource: Web article Target audience: General Cost: Free access
Basic tips for securing your wireless network.
Dhttp://reviews.cnet.com/4520-10168_7-5659898-1.htm l?tag=nav
Secure Computing and Online Communications - General
Editor's choice: Privaterra
Developed by: Computer Professionals for Social Responsibility (CPSR) Type of resource: Web site Target audience: General Cost: Free access
"Privaterra works to educate human rights workers about privacy and security technology, and to help them implement and use it in their daily operations." The Privaterra site includes directories of privacy and security tools, and online forums in Spanish and English.
80 Super Security Tips
Developed by: PC Magazine Type of resource: Web site Target audience: General Cost: Free access
"Whether your PC is 3 years or 3 days old, it faces the same, sometimes scary security issues." PC Magazine offers 80 tips for dealing with the most common problems.
Dhttp://www.pcmag.com/article2/0,1895,1838690,00.as p
Access control
Developed by: APC Type of resource: Trainers kit. Target audience: General, Trainers Cost: Free access
MMTK introduction to passwords and firewalls.
Dhttp://www.itrainonline.org/itrainonline/mmtk/secu rity.shtml
Computer & Internet Security, Privacy, Anonymity and more...
Developed by: security.tao.ca Type of resource: Web site Target audience: General Cost: Free access
Aimed at activists, Security.tao.ca offers extensive resources on security from introductory to advanced levels. Among the topics covered are general security for activists, email - privacy & security, privacy and security on the Web, and encryption.
Digital Security and Privacy for Human Rights Defenders
Developed by: FrontLine Type of resource: Online manual Target audience: General Cost: Free access
This manual from FrontLine looks at topics such as security awareness, threat assessment, destruction and recovery, internet surveillance, and identity theft.
Dhttp://www.frontlinedefenders.org/manual/en/esecma n/
Guarding against loss of data
Developed by: APC Type of resource: Trainers' kit Target audience: General Cost: Free access
MMTK introduction to guarding against loss of data.
Dhttp://www.itrainonline.org/itrainonline/mmtk/secu rity.shtml
Improve Security by Patching Windows
Developed by: TechSoup Type of resource: Web article Target audience: General Cost: Free access
Introduction to using features like Automatic Updates to protect your computer from viruses, worms, and other attacks.
Dhttp://techsoup.org/howto/articlepage.cfm?ArticleI d=507
Information Security for New/Home Users
Developed by: CERIAS Type of resource: Guides (HTML and PDF versions) Target audience: General Cost: Free access
"New to information security? Want to learn more about protecting your home system from intrusions and incidents?" This series of guides from the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University will help you understand where you may be at risk and what measures you can take to secure your computer.
Dhttp://www.cerias.purdue.edu/training_and_awarenes s/home_users/
Information Technology Security Handbook
Developed by: InfoDev Type of resource: HTML / PDF handbook Target audience: General Cost: Free access
"Informational and Communications Technologies (ICT) are crucial for social and economic development. However, there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in creating the environment needed for e-government or e-commerce activities, including sectoral projects, such as, for example, in the areas of education, health, or finance." This handbook provides an overview of security issues and the implications for developing countries and looks at security for individuals, organizations, and technical administrators, as well as at information security and government policies.
Dhttp://www.infodev-security.net/handbook/
OpenICDL
Developed by: Go-Open Campaign / ICDL Foundation Africa Type of resource: Web site Target audience: General Cost: Free access
"OpenICDL is an open source project that aims to develop and maintain a Free/Open Source version of the training materials used to ready students for the International Computer Driving License certification.\" Materials cover Basic Concepts of IT, Using a Computer and Managing Files (K Desktop Environment), Word Processing (OpenOffice.org Writer), Spreadsheets (OpenOffice.org Calc), Databases (OpenOffice DB), Presentations (OpenOffice.org Impress) and Information and Communications (Mozilla 1.4 and Ximian Evolution 1.4). Materials are available in HTML and PDF versions.
Dhttp://icdl.tsf.org.za/courseware.html
Participating with Safety: Secure Online Communications Briefings
Developed by: APC Type of resource: Zip file of .doc files Target audience: General Cost: Free access
These briefings look at information security, backing up information, passwords and access controls, using encryption and digital signatures, computer viruses and using the internet securely. Developed in 2001 by APC, the briefings offer a good overview of the principles of secure online computing.
Protect your PC
Developed by: GetSafeOnline Type of resource: Web site Target audience: General Cost: Free access
"Protect your PC" is part of the UK government GetSafeOnline initiative, and is aimed at teaching PC users the basics of secure computing and online communications. Areas covered include using a firewall, using anti-virus software, updating software, stopping spyware and using internet telephony safely. The site focusses mainly on Windows, but includes advice for Linux and Mac users.
Dhttp://www.getsafeonline.org/nqcontent.cfm?a_id=10 44
Safe Computing - Best Practices
Developed by: University of Chicago Type of resource: Web guides Target audience: General Cost: Free access
Guides on updating your operating system; using good passwords; "Don't Open Unexpected Attachments"; installing and update antivirus software; using secure programs; and installing a personal firewall. Although developed for users at the University of Chicago these guides will be of wider relevance.
Dhttp://safecomputing.uchicago.edu/practices/
SANS Top-20 Internet Security Attack Targets (2006 Annual Update)
Developed by: SANS Institute Type of resource: Web article Target audience: General Cost: Free access
"SANS has released its Top 20 Internet-based attack vectors rankings. Important trends in threats include targeted attacks, such as zero-day attacks and spear phishing, and evidence that governments are employing people to conduct cyber espionage. Also of concern are attacks on Internet-based phone systems and exploitation of security holes in web-based applications."