Threat modeling nihilists v. vegans

E
<location, date>
What the Hell is Threat Modeling
Anyway?
Eva Galperin/Parker Higgins
eva@eff.org/parker@eff.org
@evacide/@xor
Electronic Frontier Foundation
<location, date>
What the hell is a threat model?
<location, date>
1. What do you want to protect?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it you will need to protect it?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it you will need to protect it?
4. How bad are the consequences if you fail?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it you will need to protect it?
4. How bad are the consequences if you fail?
5. How much trouble are you willing to go
through to prevent those consequences?
<location, date>
ASSETS
This is what you want to protect.
Passwords
Money
Files
Conversations
Meta-data
<location, date>
ADVERSARY
This is what you want to protect your assets
from.
NSA
Your classmates
Your parents
The police
Advertisers
<location, date>
THREAT
Hackers hijack your Twitter account
Your brother reads your diary
Your boss sees your browser history
Criminals steal your credit card numbers
Adversary reads your communications
Adversary deletes or alters your
communications
<location, date>
CAPABILITY
Attacker could file a subpoena
Attacker could break into your house
Attacker could spy on your wifi network
Attacker could put a tracking device on your car
Attacker could force you to give up your
passwords
Attacker could torture your friends/family for info
Attacker could shoulder-surf your phone
password
<location, date>
<location, date>
<location, date>
<location, date>
Then there’s this guy
<location, date>
RISK
<location, date>
People have different appetites
for risk
<location, date>
Privacy Nihilists
<location, date>
Privacy Vegans
<location, date>
Security is a process, not a
product
• Tools are not enough to protect your privacy
• Build a threat model, then figure out what
tools/processes are appropriate
• Your threat model may change over time
<location, date>
<location, date>
You don’t have to a nihilist or a
vegan
<location, date>
<location, date>
<location, date>
<location, date>
<location, date>
Thanks!
Laura Poitras
Bruce Schneier
Jonathan Stray
1 of 27

Recommended

Threat modeling librarian freedom conference by
Threat modeling   librarian freedom conferenceThreat modeling   librarian freedom conference
Threat modeling librarian freedom conferenceevacide
1.8K views83 slides
An Imposter's Journey Into InfoSec by
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecStu Hirst
855 views34 slides
Dynamic Risk Assessment, March 2013 by
Dynamic Risk Assessment, March 2013Dynamic Risk Assessment, March 2013
Dynamic Risk Assessment, March 2013David Webster
559 views17 slides
Starting with Yes: How Lawyers Can Become Early Adopters of Technology by
Starting with Yes:  How Lawyers Can Become Early Adopters of TechnologyStarting with Yes:  How Lawyers Can Become Early Adopters of Technology
Starting with Yes: How Lawyers Can Become Early Adopters of TechnologyJules Miller
120 views32 slides
Making Ethical Tech: Fulfilling Obligations to Your Users, Your Staff and You... by
Making Ethical Tech: Fulfilling Obligations to Your Users, Your Staff and You...Making Ethical Tech: Fulfilling Obligations to Your Users, Your Staff and You...
Making Ethical Tech: Fulfilling Obligations to Your Users, Your Staff and You...YTH
80 views17 slides
The #1 Thing That Goes Wrong In Client Projects Even When You're Doing Everyt... by
The #1 Thing That Goes Wrong In Client Projects Even When You're Doing Everyt...The #1 Thing That Goes Wrong In Client Projects Even When You're Doing Everyt...
The #1 Thing That Goes Wrong In Client Projects Even When You're Doing Everyt...Followbright
759 views58 slides

More Related Content

Similar to Threat modeling nihilists v. vegans

LESSON 2.1.pptx by
LESSON 2.1.pptxLESSON 2.1.pptx
LESSON 2.1.pptxssuserb4c82d
3 views14 slides
Lesson 2 rules of netiquette by
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
600 views40 slides
EMPOWERMENT TECHNOLOGIES LESSON 2 by
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
37 views22 slides
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018 by
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018David Minch
187 views63 slides
Users guide by
Users guideUsers guide
Users guideDarren Thomas
166 views28 slides
Personal internet security by
Personal internet securityPersonal internet security
Personal internet securityMostafa Siraj
746 views21 slides

Similar to Threat modeling nihilists v. vegans(20)

EMPOWERMENT TECHNOLOGIES LESSON 2 by JayMarkBandoy1
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy137 views
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018 by David Minch
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
David Minch187 views
Personal internet security by Mostafa Siraj
Personal internet securityPersonal internet security
Personal internet security
Mostafa Siraj746 views
Rules of Netiquette by Rochelle Nato
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato36.5K views
Online Security and How to Make Money Online by Nader Alkeinay
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay551 views
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018 by David Minch
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
David Minch85 views
An Introduction To IT Security And Privacy for Librarians and Libraries by Blake Carver
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver454 views
N3275466 - Final Presentation Advance network (1) by Christopher Lisasi
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi257 views
DIgital Citizenship for Parents of Middle School Students by Leon Letkeman
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
Leon Letkeman534 views
Keeping Your Child Safe On The Internet by Eanes isd
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
Eanes isd809 views
General Awareness On Cyber Security by Dominic Rajesh
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh12.2K views
Resist Doxing & Take Back Your Online Privacy by Kit O'Connell
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online Privacy
Kit O'Connell1.5K views

Recently uploaded

Uni Systems for Power Platform.pptx by
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
56 views21 slides
Tunable Laser (1).pptx by
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptxHajira Mahmood
24 views37 slides
Five Things You SHOULD Know About Postman by
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
33 views43 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
41 views73 slides
virtual reality.pptx by
virtual reality.pptxvirtual reality.pptx
virtual reality.pptxG036GaikwadSnehal
11 views15 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
85 views32 slides

Recently uploaded(20)

Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman33 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson85 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri16 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely21 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada127 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 views

Threat modeling nihilists v. vegans

Editor's Notes

  1. So you’ve just heard a bunch of scary stuff and I bet you’re wondering how to make sense of it. Should you be using Tor for all your browsing? Should you be using a VPN? Should you be sending all over your email using PGP? Should you throw your phone off a cliff? Trying to protect everything from everyone all the time is exhausting. But you probably don’t have to do that. And if you want to figure out what tools and procedures you should be using to give yourself meaning privacy for the things that are important to you, you need to learn to threat model.
  2. What’s meta-data?
  3. As you can see, this is not all about bad guys hacking into your computer. Legal attacks. Social attacks. Physical attacks.
  4. Assessing capability is HARD: you have to make a guess about what resources your attacker has and how far they’re willing to go to attack your assets. When you’re thinking about your physical assets, that may seem simple. You lock your doors. You put your important papers in a safe. You can see if you’re being physically followed. But the Internet doesn’t work the way it appears to most people. The same goes for courts. So in order to understand legal attacks, you talk to a lawyer. In order to understand, attacks over the Internet, you talk to hackers.
  5. Snowden leaks taught us a lot about NSA and 5-Eyes capabilities up to until very recently. But remember that capabilities are constantly changing. New laws get passed. New technologies are invented. New bugs are discovered and exploited. This work is never done.
  6. How likely is a particular threat against a particular asset? Related to capability: sure, your telco has access to all of your call data, but the risk that they will publish this publicly in order to harm your reputation is low. Threat is important to distinguish from risk. A threat is a bad thing that can happen. The risk is how likely it is that it will occur. There’s a threat that your house will collapse. But this is more likely to happen in San Francisco, where earthquakes are common, than Stockholm, where they are not.
  7. Conductive a risk analysis is a very subjective process. Not everyone has the same priorities or views threats the same way. Many people find certain threats (like the government spying on their internet traffic) unacceptable no matter what the risk. Other people disregard high risks because they don’t view the threat as a problem. For example, if I might not care so much if someone steals my credit card numbers because the credit card company will just reverse the charges.
  8. Want advice about threats/capabilities/tools? Check out SSD. Available in Arabic, English, French, Thai, Vietnamese, Spanish, and Urdu.