Digital Risk Assessment
Who do you want to protect?
Yourself and personal identity Your family
Your team
Clients if self employed
Online personas
Digital Risk Assessment
Yourself and personal identity Your family
Your team
Clients if self employed
Online personas
Reputation ( self and work)
Privacy and control over what is accessing your data and traffic
development environment
financial transactions
financial wallet
laptop/ computer/ devices
content held on machines/ devices connecting and communicating with network and properties
online accounts and passwords
collaborative work
ISP network observers ( Big Data, Government agencies)
online abusers (trolls, hackers, adversaries)
online phishing meant to steal or subvert information or finances
What are you willing to do to prevent or reduce these consequences?
Do you have support?
Who do you communicate with?
What are circumstances?
What do you share - do you maintain a 'nym'?
Model Complexity:
Rich Models: More complex models require more noise to protect privacy, making them harder to manage.
Attack Vulnerability: Complex models are more susceptible to inference attacks.
Passive observation → Just watching data as it moves
Passive inference → Guessing information from limited or hidden data
Active → Changing or injecting data during transmission
Static key exfiltration → Stealing a long-term key once
Dynamic key exfiltration → Stealing temporary/session keys
Content exfiltration → Stealing stored data (not in transit)
Use this space for notes