[Blends-commit] [SCM] privacy branch, master, updated. 21d8971ddf4f9bfe11fcde02e901d3bb0253c7f4
DocOcassi
dococassi at boukom.com
Thu Jan 1 15:57:41 UTC 2015
The following commit has been merged in the master branch:
commit c29e038f0669cad9425168a5a211ef1b9e01bdaf
Author: DocOcassi <dococassi at boukom.com>
Date: Tue Dec 30 01:35:05 2014 +0000
Added control measures.
diff --git a/doc/Risk.odt b/doc/Risk.odt
index f29a3c6..65c21e6 100644
Binary files a/doc/Risk.odt and b/doc/Risk.odt differ
diff --git a/doc/index.wiki b/doc/index.wiki
index 084a313..75ccc79 100644
--- a/doc/index.wiki
+++ b/doc/index.wiki
@@ -26,41 +26,66 @@ http://anonscm.debian.org/cgit/blends/projects/freedom.git/
The Git page for edits.
https://github.com/debian-freedom/debian-freedom.git
-== Threat assessment ==
+== Risk Assessment ==
-*Task*
+=== Task ===
Each task (Use Case).
-*Hazards*
+=== Hazards ===
each line will define an individual threat:
- * Tool Failure (Your computer hardware/software being exploited)
- * Tool Theft (Your computer being stolen)
- * Theft (theft of value)
- * Surveillance (Spying)
- * Infiltration (infiltration into the actual system/protocol)
- * Manipulation (Manipulation of Objective)
-
-*Information*
+| Tool Failure | Your computer hardware/software being exploited |
+| Tool Theft | Your computer being stolen |
+| Theft | Theft of value |
+| Surveillance | Spying |
+| Infiltration | infiltration into the actual system/protocol |
+| Manipulation | Manipulation of Objective |
+
+=== Information ===
Categories of information that a Hazard could compromise:
- * Personal (personal information about family, generally used for Identity theft or blackmail)
- * Behavioural (Used for Selling marketing and Spying)
- * Financial (Used to denote things with monetary value)
- * Ideological (Used to identify political affiliation)
- * Operational (used to identify actions and resist pressure)
- * Private (information of a sensitive nature)
+| Personal | Personal information about family, generally used for Identity theft or blackmail |
+| Behavioural | Used for Selling marketing and Spying |
+| Financial | Used to denote things with monetary value |
+| Ideological | Used to identify political affiliation |
+| Operational | used to identify actions and resist pressure |
+| Private | information of a sensitive nature |
-*Likelyhood*
+=== Likelihood ===
In an environment with *no* protection the possibility of compromise.
-*Control Measures*
+=== Control Measures ===
Based on the Hazard and the Information threatened, define countermeasures to use to mitigate risk.
+| 1 | OS Choice | A Secure OS with minimal active exploits |
+| 2 | Firewall | Protect yourself by blocking direct attacks |
+| 3 | Anti-virus/Malware | Ensure you have Updated and active virus/malware protection, this may be provided by the OS |
+| 4 | Computer Use Training / User Competanccy | When using a computer to acieve tasks safely. |
+| 5 | Cache Purging | Ensure any processed information is not left where it can be recovered |
+| 6 | Password Safe | If you have access passwords/keys, ensure they are stored in a safe location |
+| 7 | Disk Encryption | Protect your sensitive information from being recovered from silenced disks |
+| 8 | Transport Encryption | Encrypt data during transit, must be to an acceptable* standard |
+| 9 | Out of Band Authentication | Authentication where a shared secret had been securely passed and verified |
+| 10 | Authenticated Encryption | Encryption that has been secured by an Authenticated secret |
+| 11 | Transport Anonymity | A transport to prevent identification of actors communication |
+| 12 | Perfect Forward Secrecy. | Encryption which ,even if intercepted, cannot be decrypted with any key |
+| 13 | Anonymity | Communication cannot be identified or authenticated. |
+| 14 | Platform Selection | Choice of platform/network to use based on protection given (https://tosdr.org) |
+| 15 | Authentication | Authentication (less strong then OOB?) |
+| 16 | System Use Training | A Specific system needs to give special information to the user |
+
+(* If it is good enough for trade agreements.)
+
+== Tools ==
+
+Tools available brief description and control measures implemented
+| GnuPG | Public Private key encryption | 15, 10 |
+| OTR | Private communications over instant messaging | 13, 12, 15, 10 |
+| Mix Master | Anonymous Remailer | 11, |
+== tools ==
-== tools ==
=== Development ===
--
Debian Privacy Tools Pure Blend
More information about the Blends-commit
mailing list