Cyber & IT Supervisory Forum - Additional Resources

TLP:GREEN

 "What are my strengths in regard to where my Digital Exhaust is controlled?" 40

TOPS Output As it pertains to user’s Digital Exhaust, you can use this framework and choose what makes up your personal information's Key Assets.  It is only then a user can begin assessing how their Digital Exhaust can be exploited and can begin building preventative or protective measures to mitigate their risk across a spectrum of tracking capabilities their family and they face personally.  This framework can aid a user in understanding and shifting how they interact with their Web Browser, Mobile Phone and Mobile Apps, Social Media platforms and the totality of their privacy settings which can be used for their benefit. The primary issue for a user is and will always be the intent of who can exploit the totality of their Digital Exhaust and for what purpose. 41 Personal Information: Key Assets Personal Information key assets are critical pieces of a user’s personal information that deserve special protection because of their destructive potential. 42  This Guide defines destructive potential as any key assets that if exposed publicly, could help targeting efforts by threat actors who could endanger a user’s family or themselves through intimidation or physical violence and/or damage my reputation or finances through identity theft or financial swindles.  For this Guide, the following key assets are the ones that you should apply preventative measures to include: o First and Last Name o Date of Birth o Home Address o Social Security Number o Username(s) o E-Mail Address(es) o IP Address(es) o Telephone Number(s) o Credit Card Number(s) Preventative Measures: "Key Assets" Once a user has named what threat actors they may meet, they can begin evaluating the totality of preventive measures and tailor them to be employed to thwart specific or all threat actors. These preventative measures may range from: 6.4.1 6.4.2 Types Of Key Assets How does a user show what key assets within their personal information require special protection? 6.4.3

 Ensuring simple privacy settings are configured correctly.  Mitigating physically consequential risks associated with their personal telephone number, home address and people search sites.

TLP:GREEN

Made with FlippingBook Annual report maker