These are the topics I would like to cover in this presentation:
-- How to protect data stored in devices (desktop and laptop computers, mobile phones an tablets.
-- How to protect data in process (applications and software security).
-- How to protect data in transit (applications and software to protect communications)
Example of encryption. Click on this link.
YOUR SOURCES HAVE ZERO DIGITAL SECURITY CAPACITIES. HOW DO YOU COMMUNICATE SECURELY WITH THEM?
SOURCES REFUSE TO PASS TIPS TO JOURNALISTS WHO LACK DIGITAL SECURITY CAPACITIES. WHAT CAN YOU DO?
YOU ARE CROSSING A BORDER. WHAT CAN YOU DO IF A CUSTOM OFFICER ASK YOU TO RENDER YOUR PASSWORDS?
YOU HAVE ONE TERABYTE OF STORED DATA. HOW DO YOU PROTECT IT?
JOURNALISM ISSUES IN THE DIGITAL ERA
Reduce vulnerabilities
Increase capacities
Reduce risk
Set up goals
Sharp digital skills
Use strong passwords
Do not re-use passwords
Encrypt devices
Encrypt communications
Lack digital security skills
Use weak passwords
Re-use passwords
Use non-encrypted devices
Use non-encrypted comms
reich
hood
mush
anvil
amigo
End-to-end encryption
Data storage
Metadata storage
Non encrypted database
Retention of contacts list
End-to-end encryption
No data storage
No metadata storage
Encrypted database
No retention of contacts list
Disappearing messages
End-to-end encryption
Encrypted storage
File destruction
PGP Keys
Ghost messages
End-to-end encryption
Encrypted chat
Encrypted voice
Encrypted video
Password
Thank you!