Summary of Digital Security and Human Rights (Ge Course)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

ISHIKA NEOGI, BALLB SEM-III DIV-B

SUMMARY OF DIGITAL SECURITY AND HUMAN RIGHTS:

Malware, phishing, Retaining info, Surveillance of Mass. In the digital world we


know there are real threats, but we don't really know what to do with them. How
are these risks functioning? How important is digital security?

The course is a starting point for learning more about digital threats and how
online security can be improved. The course will lead me through some of the
essential words and principles we should know for which we don't need to have
any technological knowledge.

Many of the everyday things that people are doing. That puts us at risk of being
monitored. Everywhere we go, we want everybody to know where we are. So,
we're going to take pictures, and we're going to say, we’re hanging out here we're
doing this. This gives details to someone who wants to target us. In the first part of
this course, it will discuss how online security can be related to your human rights.
It will discuss key human rights relevant to digital security and how human rights
generally enable all of us to improve our security. Finally, we can analyse our own
activities to decide which areas of digital protection we want to concentrate on.

What are human rights?

Human rights are rights that you have simply because you are human. They outline
the basic requirements that must be respected, secured and met in order to live a
life of integrity. Human rights should not have to be granted, purchased, won or
inherited. Nobody can take it from you. And since all rights are equally essential
and depend on one another, there is no hierarchical order. Human rights affect all
facets of our lives and extend both online and offline. Human beings have the right
to all human rights and to live with equality. From economic rights such as the
right to work and an acceptable standard of living, to political rights such as
freedom of speech and association; to civil rights, such as equality before the law;
and to social or cultural rights such as the right to education and participation in
the community's cultural life. There are indivisible human rights.

How does digital security relate to human rights?

The Internet has created countless new ways of connecting and accessing
knowledge, and we are more connected than ever before. Any time we use the
internet, whether we add an app on our cell phone, send an email or share on social
media, we even relay information about ourselves. Our emails, texts and phone
calls can appear inconsequential. But when these little pieces of our lives are
added together, they can be used to create a comprehensive image of who we are:
our convictions, our identity, likes, dislikes, location, movements, associations and
more.

As the use of the Internet increases, practices such as listening to private messages,
spying on activists or tracking communications from oppressed communities can
now be carried out using electronic surveillance technology. While some people
may have a deep understanding of how technology operates, they may not have a
deep understanding of human rights. Likewise, people with deep human rights
awareness cannot really understand how technology affects them. Our civil rights
face real challenges in the digital world, and there is an immediate need for all of
us to study and build technologies and techniques to improve our digital
protections and protect ourselves against new kinds of attacks.

Data defence, though, is not about hiding or telling or associating with someone in
particular. It's about protecting our right to do so. What a government finds to be
negative or unsafe or illegal varies as much as regimes themselves alter. Whether
what we think and believe, or who we identify with, becomes unfavourable under
a new government, so the security becomes essential. That's why practicing digital
protection is essentially about asserting our rights. Human rights are freedoms,
because when we stand up for our rights, we defend ourselves. To seek our privacy
is, first and foremost, to insist that our freedom cannot be taken away. When states
carry out mass monitoring on us, they are violating our human rights. It is up to us
to practice these rights, and practicing digital protection empowers us to do so.

Think of data confidentiality as a habit, a practice rather than a step forward and
then a step forward. Although computational media and software are constantly
going forward, we always need to refresh and expand our resources with regard to
new innovations in various types of intelligence. The way we take care, for
example, by cleaning our houses on a regular, weekly basis, we just ought to think
about it this way, Our own activities in the area of information security.

The right to privacy is protected by a range of internationally accepted human


rights treaties, including the Universal Declaration on Human Rights (UDHR) and
the legally binding International Covenant on Civil and Political Rights (ICCPR).
Article 12 of the UDHR specifies that No one shall be subjected to unreasonable
interference with his or her privacy, family, home or correspondence, or to attacks
on his or her dignity and reputation.

Who protects the right to privacy?

 Governments: It is mainly the duty of state governments to respect, protect


and respect human rights. It is the nations that ratify the human rights
treaties, imposing a binding duty on the state to protect human rights. The
following players often play an important part in keeping governments
accountable as they violate human rights and ensuring greater enforcement
of human rights.
 International Civil Rights Tribunals: Human rights courts consider cases in
which the state is claimed to have violated human rights. If the court
determines that a State under its jurisdiction has breached human rights, it
will issue a decision confirming the nature of the infringement and the steps
that the State must take to mitigate the infringement, for example by
providing restitution to a person whose rights have been violated or by
amending national laws or national practices.
 International organizations: World human rights groups such as
Transparency International and Amnesty International treat abuses of
privacy rights extremely seriously. They mobilize civil society, take legal
action, raise awareness and inspire people through human rights education
to take action on their rights.
 You: In order to protect our rights, we need to assert them-and this is where
you will play an important part, whether by being involved in your
neighbourhood, by raising public consciousness of the cause, or urging
states to live up to their human rights obligations.

What is data?

Data is essentially information that is compiled, measured and interpreted. For


example, an interview is a method for extracting data from the interviewee. The
student gets the data by asking her teachers a question.

What is digital data?

Digital data is material that is accessed or saved on a computer. It consists of


binary digits, a combination of zeros and zeros. These zeros and those interpreted
by a computer make up data that appears to us as text, pictures, software programs,
audio clips and records, among other types of information. Because all computers
use the same binary language, we can digitally transfer data from one device to
another.

What is metadata?

Metadata is a particular class of information that provides meaning to the data


itself. For example, you generate picture data when you take a picture with your
phone. This is the picture itself. But you're still generating metadata on the photo:
when it was taken, where it was taken, which camera took the photo, and much
more.

What is encryption?

Whereas digital media have revolutionized employment, education, politics,


connections, culture and language around the globe, they have also significantly
reduced boundaries and created new avenues for surveillance and human rights
abuses. Encryption is a technique to make us less vulnerable to privacy threats. It
makes our data and interactions online more secure.

Malware and phishing are two major digital threats which are important to
understand.

Malware is short for 'malicious software,' and that's just what it looks like. It is a
computer program that executes unnecessary, unsafe, invasive or destructive tasks
and functions on your screen. There are a number of various forms of malware.
This covers malware, spyware, Trojans, worms, adware and ransomware, among
others. They all act differently, or to different ends, but they all share something in
common: they're not your friends. They are intended to support the malware author
or vendor, not the user of the malware-infected computer. Malware can be used to
steal your private information, either by copying your data or passwords, capturing
any key you press on your keyboard, or recording from your camera or
microphone. The bulk of malware is used for illicit activities, but it is also
becoming a more popular weapon used by certain states for the purpose of
espionage and defamation operations against human beings.

If an attacker sends an email, a message or a link that seems harmless but is really
malicious, it's called phishing. The word "phishing" is based on a fishing
metaphor: the lure is baited, and the victims are baited. The 'bait' could take
several forms. The offender may be someone in need of assistance, someone who
can help you, or even someone you know directly. It can arrive by email, text
message, social media touch, pop-up browser, and more.

Important measures to increase your security online:

 Control your share settings.


 Secure logins.
 Don’t fall for clickbait and fake news.
 Read the privacy and security policy.
 Maximise your privacy with encryption.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy