Tools and tasks

No description

In the field of security, it is essential to be able to back up your data securely. Backup is now supported by all standard operating systems within system applications, so the key is to choose the location or media to which you want to back up. Alternative tools include Bvckup 2, Aomei Backupper, and Acronis True Image. If you are backing up only selected documents that are not too large, cloud storage such as Google Drive or OneDrive may be a good choice.

Interestingly, users sometimes deal with backing up a regular computer, but they pay much less attention to mobile devices. While in the case of iOS, iCloud takes care of synchronization (and therefore also the backup), if it has enough space for Android, it is necessary to set up backup.  

It is also helpful if the data, especially sensitive data, is encrypted so that no unauthorized person can access it. It is possible to use VeraCrypt, BitLocker, or Crypt4Free (but also many others), which allow you to encrypt files or entire disks efficiently. Such protected data can then be backed up, for example, to cloud storage (for example, Mega.nz can be considered an extremely secure option), which supports end-to-end encryption. This ensures that the server operator does not have access to the data or only to their encrypted form.

No description

No description

No description

Passwords are a significant weakness in security. While on mobile phones, it is already quite common for authentication to use a fingerprint in typical applications or web services. One of the possible (and often usable) solutions is to use a digital keychain, which is used to store passwords. For such work, you can use, for example, LastPass, KeePass, or Bitwarden. These applications are suitable because you can then work with long and demanding passwords and easily use almost any number of passwords, for example, for each online service. In the event of a password leak on the part of a specific service, the security risk is minimized.    

It is advisable to consider when it pays to use incognito mode within web browsers, which does not store any browsing information. However, at the same time, the user is still relatively well localized or identifiable by IP for servers. However, there is no long-term storage of cookies. However, it is possible (and appropriate) to control or regulate them in a certain way. Examples are browser add-ons, such as the robust EditThisCookie for Chrome or the simple Vanilla Cookie Manager and Cookie Manager.

No description

No description

No description

It is possible to use the so-called digital identity systems for single sign-on to the services - today, the most widespread Google account and Facebook account, but if you want to work more with your privacy, you can use MojeID or international OpenID. These tools provide the ability to log in to various services without giving a password to those services. All you have to do is log in to your digital identity system.  

In terms of ensuring anonymity on the Internet, it is possible to use technologies that are associated with Onion routing, especially the Tor network. It is not possible to trace the IP address and, therefore, the identity of the user. It thus becomes anonymous not only for the server to which it wants to connect but also for someone who wants to monitor network traffic (for example, a national regulator, secret service, etc.). It is also possible to connect to Tor via Tor Browser, which makes all network browsing both easy and anonymous at the same time.  

No description

No description

Task

In the fourth task, focus on developing the following questions:

  • What was most interesting about the topic? Argue! (approx. 100 words)
  • Write down an interesting idea you came across while watching a video at the end of one of the topics. Write what kind of video it was and what you took away from it. (approx. 100 words)
  • Choose five tools from our final overview, write which ones, and describe how and for what you use them. (approx. 5x 80 words)
  • Try to rate yourself on a scale of 1-8 (beginner - expert) in safety.

Practical task:

  • Use haveibeenpwned to make sure your password is secure. Describe the results.
  • Take one action that will increase the security of your device or online identity. Describe it. Be careful not to reveal your anonymity.

You are running an old browser version. We recommend updating your browser to its latest version.

More info