27
<location, date> What the Hell is Threat Modeling Anyway? Eva Galperin/Parker Higgins [email protected]/[email protected] @evacide/@xor Electronic Frontier Foundation

Threat modeling nihilists v. vegans

  • Upload
    evacide

  • View
    408

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Threat modeling  nihilists v. vegans

<location, date>

What the Hell is Threat Modeling Anyway?

Eva Galperin/Parker [email protected]/[email protected]@evacide/@xorElectronic Frontier Foundation

Page 2: Threat modeling  nihilists v. vegans

<location, date>

What the hell is a threat model?

Page 3: Threat modeling  nihilists v. vegans

<location, date>

1. What do you want to protect?

Page 4: Threat modeling  nihilists v. vegans

<location, date>

1. What do you want to protect?2. Who do you want to protect it from?

Page 5: Threat modeling  nihilists v. vegans

<location, date>

1. What do you want to protect?2. Who do you want to protect it from?3. How likely is it you will need to protect

it?

Page 6: Threat modeling  nihilists v. vegans

<location, date>

1. What do you want to protect?2. Who do you want to protect it from?3. How likely is it you will need to protect

it?4. How bad are the consequences if you

fail?

Page 7: Threat modeling  nihilists v. vegans

<location, date>

1. What do you want to protect?2. Who do you want to protect it from?3. How likely is it you will need to protect

it?4. How bad are the consequences if you

fail?5. How much trouble are you willing to go

through to prevent those consequences?

Page 8: Threat modeling  nihilists v. vegans

<location, date>

ASSETS

This is what you want to protect.

PasswordsMoneyFilesConversationsMeta-data

Page 9: Threat modeling  nihilists v. vegans

<location, date>

ADVERSARY

This is what you want to protect your assets from.

NSAYour classmatesYour parentsThe policeAdvertisers

Page 10: Threat modeling  nihilists v. vegans

<location, date>

THREAT

Hackers hijack your Twitter accountYour brother reads your diaryYour boss sees your browser historyCriminals steal your credit card numbersAdversary reads your communicationsAdversary deletes or alters your communications

Page 11: Threat modeling  nihilists v. vegans

<location, date>

CAPABILITY

Attacker could file a subpoenaAttacker could break into your houseAttacker could spy on your wifi networkAttacker could put a tracking device on your carAttacker could force you to give up your passwordsAttacker could torture your friends/family for infoAttacker could shoulder-surf your phone password

Page 12: Threat modeling  nihilists v. vegans

<location, date>

Page 13: Threat modeling  nihilists v. vegans

<location, date>

Page 14: Threat modeling  nihilists v. vegans

<location, date>

Page 15: Threat modeling  nihilists v. vegans

<location, date>

Then there’s this guy

Page 16: Threat modeling  nihilists v. vegans

<location, date>

RISK

Page 17: Threat modeling  nihilists v. vegans

<location, date>

People have different appetites for risk

Page 18: Threat modeling  nihilists v. vegans

<location, date>

Privacy Nihilists

Page 19: Threat modeling  nihilists v. vegans

<location, date>

Privacy Vegans

Page 20: Threat modeling  nihilists v. vegans

<location, date>

Security is a process, not a product

• Tools are not enough to protect your privacy

• Build a threat model, then figure out what tools/processes are appropriate

• Your threat model may change over time

Page 21: Threat modeling  nihilists v. vegans

<location, date>

Page 22: Threat modeling  nihilists v. vegans

<location, date>

You don’t have to a nihilist or a vegan

Page 23: Threat modeling  nihilists v. vegans

<location, date>

Page 24: Threat modeling  nihilists v. vegans

<location, date>

Page 25: Threat modeling  nihilists v. vegans

<location, date>

Page 26: Threat modeling  nihilists v. vegans

<location, date>

Page 27: Threat modeling  nihilists v. vegans

<location, date>

Thanks!

Laura PoitrasBruce SchneierJonathan Stray