Digital Risk Assessment

Who do you want to protect?

  • Yourself and personal identity Your family

  • Your team

  • Clients if self employed

  • Online personas

What do you want to protect?

  • Reputation ( self and work)

  • Privacy and control over what is accessing your data and traffic

  • development environment

  • financial transactions

  • financial wallet

  • laptop/ computer/ devices

  • content held on machines/ devices connecting and communicating with network and properties

  • online accounts and passwords

  • collaborative work

Who are you protecting this from?

  • ISP network observers ( Big Data, Government agencies)

  • online abusers (trolls, hackers, adversaries)

  • online phishing meant to steal or subvert information or finances


What do you stand to lose and how severe would that loss be?

  • What are you willing to do to prevent or reduce these consequences?

  • Do you have support?

Trust of Individuals

  • Who do you communicate with?

  • What are circumstances?

  • What do you share - do you maintain a 'nym'?



Model Complexity:
Rich Models: More complex models require more noise to protect privacy, making them harder to manage.
Attack Vulnerability: Complex models are more susceptible to inference attacks.

  • Passive observation → Just watching data as it moves

  • Passive inferenceGuessing information from limited or hidden data

  • ActiveChanging or injecting data during transmission

  • Static key exfiltration → Stealing a long-term key once

  • Dynamic key exfiltration → Stealing temporary/session keys

  • Content exfiltration → Stealing stored data (not in transit)

The end


Use this space for notes