Digital Security

Opportunities and challenges in digitizing security

differences

Online versus in-person conversation

Learning Objectives

  • Develop data protection practices
  • Justify the use of Two-Factory Authentication
  • Differentiate the features physical and digital security
  • Evaluate and adopt a password management system

How would you secure it?

Where would you secure it?

Digital affordances

  • Time (asynchronous communication)
  • Geography (transcend borders)
  • Presence (anonymity, discrimination)
  • Speed
  • Archival
  • Manipulation of data for interoperability

Digital Security Issues

  • Time: attacks can happen anytime
  • Geography: originate from anywhere
  • Presence: anonymous and without prejudice
  • Speed: many tries per second
  • Archival: trojans can lay dormant for later
  • Manipulation: several layers can be targeted

Our own worst enemy

  • Cannot rely on a single approach
  • Too many layers disrupt the user-experience
  • Social engineering is the easiest way to gain access

ISW: Security

By Am Sagarwala

ISW: Security

Perspection: using fractals to understand naturally occurring formations in society.

  • 1,122