SlideShare a Scribd company logo
1 of 27
<location, date>
What the Hell is Threat Modeling
Anyway?
Eva Galperin/Parker Higgins
eva@eff.org/parker@eff.org
@evacide/@xor
Electronic Frontier Foundation
<location, date>
What the hell is a threat model?
<location, date>
1. What do you want to protect?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it you will need to protect it?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it you will need to protect it?
4. How bad are the consequences if you fail?
<location, date>
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it you will need to protect it?
4. How bad are the consequences if you fail?
5. How much trouble are you willing to go
through to prevent those consequences?
<location, date>
ASSETS
This is what you want to protect.
Passwords
Money
Files
Conversations
Meta-data
<location, date>
ADVERSARY
This is what you want to protect your assets
from.
NSA
Your classmates
Your parents
The police
Advertisers
<location, date>
THREAT
Hackers hijack your Twitter account
Your brother reads your diary
Your boss sees your browser history
Criminals steal your credit card numbers
Adversary reads your communications
Adversary deletes or alters your
communications
<location, date>
CAPABILITY
Attacker could file a subpoena
Attacker could break into your house
Attacker could spy on your wifi network
Attacker could put a tracking device on your car
Attacker could force you to give up your
passwords
Attacker could torture your friends/family for info
Attacker could shoulder-surf your phone
password
<location, date>
<location, date>
<location, date>
<location, date>
Then there’s this guy
<location, date>
RISK
<location, date>
People have different appetites
for risk
<location, date>
Privacy Nihilists
<location, date>
Privacy Vegans
<location, date>
Security is a process, not a
product
• Tools are not enough to protect your privacy
• Build a threat model, then figure out what
tools/processes are appropriate
• Your threat model may change over time
<location, date>
<location, date>
You don’t have to a nihilist or a
vegan
<location, date>
<location, date>
<location, date>
<location, date>
<location, date>
Thanks!
Laura Poitras
Bruce Schneier
Jonathan Stray

More Related Content

Similar to Threat modeling nihilists v. vegans

Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
David Minch
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptx
HeideYlanan1
 
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
David Minch
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
Eanes isd
 

Similar to Threat modeling nihilists v. vegans (20)

hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
LESSON 2.1.pptx
LESSON 2.1.pptxLESSON 2.1.pptx
LESSON 2.1.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptx
 
Users guide
Users guideUsers guide
Users guide
 
Personal internet security
Personal internet securityPersonal internet security
Personal internet security
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Unmasking You
Unmasking YouUnmasking You
Unmasking You
 
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesDC 2018
 
Jake on cybersafety
Jake on cybersafetyJake on cybersafety
Jake on cybersafety
 
Gunning for granny
Gunning for grannyGunning for granny
Gunning for granny
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Anatomy of a Cyber-Attack
Anatomy of a Cyber-AttackAnatomy of a Cyber-Attack
Anatomy of a Cyber-Attack
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
nanma cyber.ppt
nanma cyber.pptnanma cyber.ppt
nanma cyber.ppt
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Threat modeling nihilists v. vegans

Editor's Notes

  1. So you’ve just heard a bunch of scary stuff and I bet you’re wondering how to make sense of it. Should you be using Tor for all your browsing? Should you be using a VPN? Should you be sending all over your email using PGP? Should you throw your phone off a cliff? Trying to protect everything from everyone all the time is exhausting. But you probably don’t have to do that. And if you want to figure out what tools and procedures you should be using to give yourself meaning privacy for the things that are important to you, you need to learn to threat model.
  2. What’s meta-data?
  3. As you can see, this is not all about bad guys hacking into your computer. Legal attacks. Social attacks. Physical attacks.
  4. Assessing capability is HARD: you have to make a guess about what resources your attacker has and how far they’re willing to go to attack your assets. When you’re thinking about your physical assets, that may seem simple. You lock your doors. You put your important papers in a safe. You can see if you’re being physically followed. But the Internet doesn’t work the way it appears to most people. The same goes for courts. So in order to understand legal attacks, you talk to a lawyer. In order to understand, attacks over the Internet, you talk to hackers.
  5. Snowden leaks taught us a lot about NSA and 5-Eyes capabilities up to until very recently. But remember that capabilities are constantly changing. New laws get passed. New technologies are invented. New bugs are discovered and exploited. This work is never done.
  6. How likely is a particular threat against a particular asset? Related to capability: sure, your telco has access to all of your call data, but the risk that they will publish this publicly in order to harm your reputation is low. Threat is important to distinguish from risk. A threat is a bad thing that can happen. The risk is how likely it is that it will occur. There’s a threat that your house will collapse. But this is more likely to happen in San Francisco, where earthquakes are common, than Stockholm, where they are not.
  7. Conductive a risk analysis is a very subjective process. Not everyone has the same priorities or views threats the same way. Many people find certain threats (like the government spying on their internet traffic) unacceptable no matter what the risk. Other people disregard high risks because they don’t view the threat as a problem. For example, if I might not care so much if someone steals my credit card numbers because the credit card company will just reverse the charges.
  8. Want advice about threats/capabilities/tools? Check out SSD. Available in Arabic, English, French, Thai, Vietnamese, Spanish, and Urdu.