Summary of Digital Security and Human Rights (Ge Course)
Summary of Digital Security and Human Rights (Ge Course)
Summary of Digital Security and Human Rights (Ge Course)
The course is a starting point for learning more about digital threats and how
online security can be improved. The course will lead me through some of the
essential words and principles we should know for which we don't need to have
any technological knowledge.
Many of the everyday things that people are doing. That puts us at risk of being
monitored. Everywhere we go, we want everybody to know where we are. So,
we're going to take pictures, and we're going to say, we’re hanging out here we're
doing this. This gives details to someone who wants to target us. In the first part of
this course, it will discuss how online security can be related to your human rights.
It will discuss key human rights relevant to digital security and how human rights
generally enable all of us to improve our security. Finally, we can analyse our own
activities to decide which areas of digital protection we want to concentrate on.
Human rights are rights that you have simply because you are human. They outline
the basic requirements that must be respected, secured and met in order to live a
life of integrity. Human rights should not have to be granted, purchased, won or
inherited. Nobody can take it from you. And since all rights are equally essential
and depend on one another, there is no hierarchical order. Human rights affect all
facets of our lives and extend both online and offline. Human beings have the right
to all human rights and to live with equality. From economic rights such as the
right to work and an acceptable standard of living, to political rights such as
freedom of speech and association; to civil rights, such as equality before the law;
and to social or cultural rights such as the right to education and participation in
the community's cultural life. There are indivisible human rights.
The Internet has created countless new ways of connecting and accessing
knowledge, and we are more connected than ever before. Any time we use the
internet, whether we add an app on our cell phone, send an email or share on social
media, we even relay information about ourselves. Our emails, texts and phone
calls can appear inconsequential. But when these little pieces of our lives are
added together, they can be used to create a comprehensive image of who we are:
our convictions, our identity, likes, dislikes, location, movements, associations and
more.
As the use of the Internet increases, practices such as listening to private messages,
spying on activists or tracking communications from oppressed communities can
now be carried out using electronic surveillance technology. While some people
may have a deep understanding of how technology operates, they may not have a
deep understanding of human rights. Likewise, people with deep human rights
awareness cannot really understand how technology affects them. Our civil rights
face real challenges in the digital world, and there is an immediate need for all of
us to study and build technologies and techniques to improve our digital
protections and protect ourselves against new kinds of attacks.
Data defence, though, is not about hiding or telling or associating with someone in
particular. It's about protecting our right to do so. What a government finds to be
negative or unsafe or illegal varies as much as regimes themselves alter. Whether
what we think and believe, or who we identify with, becomes unfavourable under
a new government, so the security becomes essential. That's why practicing digital
protection is essentially about asserting our rights. Human rights are freedoms,
because when we stand up for our rights, we defend ourselves. To seek our privacy
is, first and foremost, to insist that our freedom cannot be taken away. When states
carry out mass monitoring on us, they are violating our human rights. It is up to us
to practice these rights, and practicing digital protection empowers us to do so.
Think of data confidentiality as a habit, a practice rather than a step forward and
then a step forward. Although computational media and software are constantly
going forward, we always need to refresh and expand our resources with regard to
new innovations in various types of intelligence. The way we take care, for
example, by cleaning our houses on a regular, weekly basis, we just ought to think
about it this way, Our own activities in the area of information security.
What is data?
What is metadata?
What is encryption?
Malware and phishing are two major digital threats which are important to
understand.
Malware is short for 'malicious software,' and that's just what it looks like. It is a
computer program that executes unnecessary, unsafe, invasive or destructive tasks
and functions on your screen. There are a number of various forms of malware.
This covers malware, spyware, Trojans, worms, adware and ransomware, among
others. They all act differently, or to different ends, but they all share something in
common: they're not your friends. They are intended to support the malware author
or vendor, not the user of the malware-infected computer. Malware can be used to
steal your private information, either by copying your data or passwords, capturing
any key you press on your keyboard, or recording from your camera or
microphone. The bulk of malware is used for illicit activities, but it is also
becoming a more popular weapon used by certain states for the purpose of
espionage and defamation operations against human beings.
If an attacker sends an email, a message or a link that seems harmless but is really
malicious, it's called phishing. The word "phishing" is based on a fishing
metaphor: the lure is baited, and the victims are baited. The 'bait' could take
several forms. The offender may be someone in need of assistance, someone who
can help you, or even someone you know directly. It can arrive by email, text
message, social media touch, pop-up browser, and more.