Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
learn:opsec [2016/10/04 02:43] – making the lists list anonymous | learn:opsec [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 15: | Line 15: | ||
- Always have a pair of eyes on your hardware (it does not have to be your pair!). | - Always have a pair of eyes on your hardware (it does not have to be your pair!). | ||
- Lock your screen when you leave your computer/ | - Lock your screen when you leave your computer/ | ||
- | - Make sure to use encrypted connections (watch out for the "https://" in the address bar. | + | - Make sure to use encrypted connections (watch out for the "http**s**:" in the address bar. |
- Encrypt your hard disk. | - Encrypt your hard disk. | ||
- Don't open links or attachments from emails. | - Don't open links or attachments from emails. | ||
+ | ===== CIA ===== | ||
- | === CIA === | + | * **C**onfidentiality, |
+ | * **I**ntegrity, | ||
+ | * **A**vailability | ||
- | * **C**onfidentiality. | + | are three things you might want to have, and which are achieved through e.g. encrypting messages, signing messages, and using services without a single point of failure. |
- | * **I**ntegrity. | + | |
- | * **A**vailability. | + |