1 00:00:00,720 --> 00:00:08,000 We now understand the difference between privacy anonymity and pseudo anonymity which then brings onto 2 00:00:08,390 --> 00:00:11,950 security here we can see our assets. 3 00:00:12,060 --> 00:00:18,180 These are the things that we care about the things that we want to be private like our files our accounts 4 00:00:18,420 --> 00:00:26,190 our financials our e-mail and things that may relate to anonymity and our identity and not wanting association 5 00:00:26,190 --> 00:00:27,040 with our identity. 6 00:00:27,040 --> 00:00:31,460 Maybe our browser history what we download what we post and so on. 7 00:00:31,500 --> 00:00:38,890 The assets are individual to you your personal needs and to protect these assets. 8 00:00:38,910 --> 00:00:50,520 We apply security through various security controls security controls our VPN is encryption OPSEC patching 9 00:00:50,550 --> 00:00:57,240 hasty ETP filters open g.p locked screens and the other is that you can see here. 10 00:00:57,240 --> 00:01:08,090 So this means that security is the degree to which our assets are resistant to threats from our adversaries 11 00:01:08,220 --> 00:01:17,190 and we select security controls based on the type of threats and adversaries that we face threats all 12 00:01:17,190 --> 00:01:24,660 the bad things that can happen like a malware attack like mass surveillance like ex-boy kids like the 13 00:01:24,660 --> 00:01:30,250 weakening of encryption and a virus infection and the others that you can see here. 14 00:01:30,390 --> 00:01:38,650 And these threats they are enabled by our adversaries which might be hackers cyber criminals nations 15 00:01:38,720 --> 00:01:45,970 stays oppressive regimes and maybe something like your ex-partner if you're lucky and you can also see 16 00:01:45,970 --> 00:01:55,320 here these red triangles these represent vulnerabilities boobs and weaknesses in your security controls 17 00:01:55,440 --> 00:02:03,150 a threat will try to exploit vulnerabilities in your security to impact your assets. 18 00:02:03,420 --> 00:02:12,030 For example malware infecting your computer through the vulnerability of being on patched risk equals 19 00:02:12,320 --> 00:02:15,430 vulnerabilities times threats times. 20 00:02:15,430 --> 00:02:19,600 Consequences would be a way of representing it in a formula. 21 00:02:19,620 --> 00:02:25,770 The likelihood of threats exploiting vulnerabilities in your security controls and the consequences 22 00:02:25,770 --> 00:02:35,150 of that is known as risk risk to your assets the risk to you the risk to your privacy and anonymity 23 00:02:35,460 --> 00:02:39,000 and the threats and adversaries that you face. 24 00:02:39,000 --> 00:02:46,050 These are cold your threat landscape or your threat model your threat landscape will be individual to 25 00:02:46,050 --> 00:02:46,600 you. 26 00:02:46,650 --> 00:02:47,580 In the section on. 27 00:02:47,580 --> 00:02:48,810 Know your enemy. 28 00:02:48,810 --> 00:02:54,540 We will better understand the threats and adversaries that are out there so you can assess what your 29 00:02:54,540 --> 00:02:56,650 individual threat landscape is. 30 00:02:56,650 --> 00:03:04,200 Although we will share a lot of common threats and adversaries such as hackers cyber criminals and so 31 00:03:04,200 --> 00:03:08,400 on though we may not all have an unfortunate ex-partner. 32 00:03:08,400 --> 00:03:14,220 So as you can clearly see security does absolutely not exist in isolation. 33 00:03:14,220 --> 00:03:17,260 There is not a one size fits all solution. 34 00:03:17,290 --> 00:03:25,740 Your security controls should be selected based on their ability to mitigate your perceived threats 35 00:03:25,830 --> 00:03:30,480 and adversaries and the consequences of that realization. 36 00:03:30,480 --> 00:03:37,440 For example you might select toil as a security control to help mitigate against mass surveillance the 37 00:03:37,430 --> 00:03:43,620 threat of mass surveillance from an oppressive regime and you might choose top because the consequences 38 00:03:43,620 --> 00:03:50,070 are high in terms of your identity and once your identity is known the consequences will be realized. 39 00:03:50,070 --> 00:03:57,990 So you must implement security controls to protect your assets to ensure privacy and anonymity and pseudo 40 00:03:57,990 --> 00:04:00,110 anonymity if you require it. 41 00:04:00,120 --> 00:04:02,300 Security is a technology. 42 00:04:02,310 --> 00:04:10,170 Security is also an action and it's also a process is very important to understand are security controls 43 00:04:10,600 --> 00:04:12,420 not just technology. 44 00:04:12,420 --> 00:04:20,100 You must understand that security controls are also processes and actions your actions are in fact one 45 00:04:20,100 --> 00:04:25,740 of the most important security controls to protect your assets and mitigate threats and adversaries. 46 00:04:25,830 --> 00:04:34,230 The outcome of suitable security processes actions and technology is the protection of your assets privacy 47 00:04:34,290 --> 00:04:35,870 and anonymity.