Digital Security
Opportunities and challenges in digitizing security
differences
Online versus in-person conversation
Learning Objectives
Develop data protection practices
Justify the use of
Two-Factory Authentication
Differentiate the features physical and digital security
Evaluate and adopt a password management system
How would you secure it?
Where would you secure it?
Digital affordances
Time (asynchronous communication)
Geography (transcend borders)
Presence (anonymity, discrimination)
Speed
Archival
Manipulation of data for interoperability
Digital Security Issues
Time
: attacks can happen anytime
Geography
: originate from anywhere
Presence
: anonymous and without prejudice
Speed
: many tries per second
Archival
: trojans can lay dormant for later
Manipulation
: several layers can be targeted
Our own worst enemy
Cannot rely on a single approach
Too many layers disrupt the user-experience
Social engineering is the easiest way to gain access
Made with Slides.com