Digital Risk AssessmentWho do you want to protect?Yourself and personal identity Your familyYour teamClients if self employedOnline personas
What do you want to protect?Reputation ( self and work)Privacy and control over what is accessing your data and trafficdevelopment environmentfinancial transactionsfinancial walletlaptop/ computer/ devicescontent held on machines/ devices connecting and communicating with network and propertiesonline accounts and passwordscollaborative work
Who are you protecting this from?ISP network observers ( Big Data, Government agencies)online abusers (trolls, hackers, adversaries)online phishing meant to steal or subvert information or finances
What do you stand to lose and how severe would that loss be?What are you willing to do to prevent or reduce these consequences?Do you have support?
Trust of IndividualsWho do you communicate with?What are circumstances?What do you share - do you maintain a 'nym'?
Model Complexity: Rich Models: More complex models require more noise to protect privacy, making them harder to manage. Attack Vulnerability: Complex models are more susceptible to inference attacks.
Passive observation → Just watching data as it movesPassive inference → Guessing information from limited or hidden dataActive → Changing or injecting data during transmissionStatic key exfiltration → Stealing a long-term key onceDynamic key exfiltration → Stealing temporary/session keysContent exfiltration → Stealing stored data (not in transit)