SlideShare a Scribd company logo
1 of 33
Threat Modeling
Practical Security Practices
Josh Gillespie
@jcgillespie
Hello
Let’s talk
about threat
models!
What is a threat model?
Threat Modeling is…
Who should do it?
Why do it?
So what is the objective?
Everyone is
different
#1. What do I want to protect?
#2. Who do I want to protect it from?
Adversaries are people
#3. How bad are the consequences if I fail?
#4. How likely is it that I will
need to protect it?
#5. How much trouble am I willing to go through to try to prevent
potential consequences?
Be realistic
Practical
security
PRACTICE
He didn’t just say
that, did he?
Let’s get more technical
5 questions in 4 steps
Identify your assets
STRIDE
• Spoofing Identity
• Tampering with Data
• Repudiation
• Information Disclosure
• Denial of Service
• Escalation of Privilege
DREAD
• Damage
• Reproducibility
• Exploitability
• Affected Users
• Discoverability
• Detectability
Defense
Change perspective
& repeat
Call to civic action
Thank you!
Josh Gillespie
@jcgillespie

More Related Content

Similar to Practical Security Practices: Threat Modeling

Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...EC-Council
 
District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]Benjamin Drader
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3SEdgevalue
 
Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...
Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...
Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...BizLibrary
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyMike Murray
 
Designing effective user research to discover the truth
Designing effective user research to discover the truth Designing effective user research to discover the truth
Designing effective user research to discover the truth PeakXD
 
building an inclusive culture (National Safety Council Nebraska annual confer...
building an inclusive culture (National Safety Council Nebraska annual confer...building an inclusive culture (National Safety Council Nebraska annual confer...
building an inclusive culture (National Safety Council Nebraska annual confer...Joe Gerstandt
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatAhmed Masud
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceEvan Francen
 
Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish
 
Valuing Differences Diversity Presentation
Valuing Differences Diversity PresentationValuing Differences Diversity Presentation
Valuing Differences Diversity PresentationEB2008CBRE
 
How to build your own greenfield?
How to build your own greenfield?How to build your own greenfield?
How to build your own greenfield?Mário Gonçalves
 
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015n|u - The Open Security Community
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
 

Similar to Practical Security Practices: Threat Modeling (20)

Social engineering and indian jugaad
Social engineering and indian jugaadSocial engineering and indian jugaad
Social engineering and indian jugaad
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3S
 
Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...
Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...
Top 5 Soft Skills: What Successful People Know that Every Employee Needs to K...
 
Application Security: AI LLMs and ML Threats & Defenses
Application Security: AI LLMs and ML Threats & DefensesApplication Security: AI LLMs and ML Threats & Defenses
Application Security: AI LLMs and ML Threats & Defenses
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
 
Designing effective user research to discover the truth
Designing effective user research to discover the truth Designing effective user research to discover the truth
Designing effective user research to discover the truth
 
building an inclusive culture (National Safety Council Nebraska annual confer...
building an inclusive culture (National Safety Council Nebraska annual confer...building an inclusive culture (National Safety Council Nebraska annual confer...
building an inclusive culture (National Safety Council Nebraska annual confer...
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider Threat
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
TASK 3 presentation
TASK 3 presentation TASK 3 presentation
TASK 3 presentation
 
Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12
 
7 keys to success
7 keys to success7 keys to success
7 keys to success
 
Valuing Differences Diversity Presentation
Valuing Differences Diversity PresentationValuing Differences Diversity Presentation
Valuing Differences Diversity Presentation
 
How to build your own greenfield?
How to build your own greenfield?How to build your own greenfield?
How to build your own greenfield?
 
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 

More from Josh Gillespie

Introduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and HowIntroduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and HowJosh Gillespie
 
Exposing the Spy in Your Pocket
Exposing the Spy in Your PocketExposing the Spy in Your Pocket
Exposing the Spy in Your PocketJosh Gillespie
 
Automation: PowerShell & DSC
Automation: PowerShell & DSCAutomation: PowerShell & DSC
Automation: PowerShell & DSCJosh Gillespie
 
Teaching the cloud to think
Teaching the cloud to thinkTeaching the cloud to think
Teaching the cloud to thinkJosh Gillespie
 
A Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit TestingA Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit TestingJosh Gillespie
 
Dude, I just stepped into your code
Dude, I just stepped into your codeDude, I just stepped into your code
Dude, I just stepped into your codeJosh Gillespie
 

More from Josh Gillespie (8)

Introduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and HowIntroduction to Containers: What, Why, and How
Introduction to Containers: What, Why, and How
 
Exposing the Spy in Your Pocket
Exposing the Spy in Your PocketExposing the Spy in Your Pocket
Exposing the Spy in Your Pocket
 
Automation: PowerShell & DSC
Automation: PowerShell & DSCAutomation: PowerShell & DSC
Automation: PowerShell & DSC
 
Teaching the cloud to think
Teaching the cloud to thinkTeaching the cloud to think
Teaching the cloud to think
 
Who are you?
Who are you?Who are you?
Who are you?
 
A Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit TestingA Pragmatic Introduction to Unit Testing
A Pragmatic Introduction to Unit Testing
 
Dude, I just stepped into your code
Dude, I just stepped into your codeDude, I just stepped into your code
Dude, I just stepped into your code
 
A DevOps Discussion
A DevOps DiscussionA DevOps Discussion
A DevOps Discussion
 

Recently uploaded

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 

Recently uploaded (20)

Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 

Practical Security Practices: Threat Modeling

Editor's Notes

  1. Ground rules Introductions Who are you? Why are you here? This isn’t some shiny new tech. What brought you to this session? Who am I? Why listen to me? Don’t. Trust but verify Do. Your. Homework. Who works with me? Teams who are struggling with AuthN/AuthZ problems. Companies fed up with the fear-mongering and scare tactic sales in the security industry. Just want practical, business-justified advice People who are scared of some new reality about their security profile. Why am I here?
  2. Who, What, Why, How risk analysis. Identifying, quantifying, and ranking risk. Not just for tech General -> specific
  3. “map” of assets, threats, and protections Set of plans for protection of an asset from a specific threat Informs risk assessment to prioritize action
  4. the cyclical process of creating/evaluating these.
  5. You! You already understand this intrinsically You do already understand this intrinsically – changing locks, PIN on phone, The decisions that when into choosing to have a PIN might have been subconscious, but that’s threat modeling.
  6. Helps Risk analysis You can’t protect against everything. Find the point of diminishing return on your security investment Defensive – informs risk analysis Offensive – informs efficient effort investment proactively Cheaper than failing Justify the expense - time, money, priority
  7. Threat model failures affect you too…
  8. Move the needle. Make better, conscious choices personally and professionally
  9. Direct and indirect Why are you asked to rotate your passwords regularly? Why do you change your locks when you move in somewhere new? Why do you change them when you break up with someone? Why is 2FA a good idea? Why do racecar drivers use 5 point harnesses, but we only use a 3 point seatbelt? Why do some gas stations have thick glass and others don’t? Why don’t bank tellers sit behind bars/glass anymore?
  10. Three Components Assets Threats Protections
  11. What do you want to protect? (The data, communications, and other things that could cause problems for you if misused.) Who do you want to protect it from? (The people, organizations, and criminal actors who might seek access to that stuff.) How bad are the consequences if you fail? How likely is it that you will need to protect it? (Your personal level of exposure to those threats.) How much trouble are you willing to go through in order to try to prevent those? (The money, time and convenience you're willing to dispense with to protect those things.)
  12. Warning – Depending on your situation, your threat model artifacts might be something you want to destroy or protect as an asset.
  13. Assets – something you value and want to protect Contact info Financial info Locations Affiliations
  14. Adversaries – someone acting contrary to your security goals Enemies are people Can be person or organization Can be an active adversary or passive adversary (nosey neighbor) Can be targeted or dragnet adversary Often hypothetical Have capabilities and motivations
  15. Capability and motivation matters If cost of obtaining your asset exceeds value of asset, less likely to pursue, no ROI
  16. Worst case scenarios Consider capability/audience Your cell phone company has more capability than an a hacker on an open WiFi AP What will your adversary do with your data
  17. Assess Risk – likelihood that a particular threat to a particular asset will occur. Threat != risk. Thread is something that can happen. Risk is probability it WILL happen. Guard against amplification of perceived risk – use a rubric
  18. Requires the risk assessment Increased security is always an inherent tradeoff Accessibility/convenience Money Time
  19. This World of Ours - James Mickens https://www.usenix.org/system/files/1401_08-12_mickens.pdf
  20. Requires practice Add to your normal software dev practices Add to your regular best practices Rinse and Repeat. You’re never done, just done enough for now.
  21. System changes Topology change Vulnerability bulletins Time Changes in your “profile” (CEO bragging, other hacks, scandal, press release, politics)
  22. We take an architecture-centric, data flow approach
  23. Identify Assets Find threats with STRIDE Use DREAD-D/DREAD+D to get risk score Find/recommend defenses
  24. Application Overview – Enumerate Components/data flows/trust boundaries Decompose the application – look not every component has the same threat model. Auth is higher than
  25. Microsoft developed pneumonic to help you think through the categories of threats Not exhaustive/not scientific, just a memory tool Spoofing Identity – Users cannot become other users. Tampering with Data – Never trust the user Repudiation – Ability to deny you did something. Can’t prove who did what Information Disclosure – people find out things they shouldn’t know Denial of Service – can you withstand? How do you mitigate? Escalation of Privilege – allows users to do more than they should be able to do
  26. Quantify with DREAD-D/DREAD+D DREAD minus D and DREAD plus D Damage Potential Reproducibility – how easy to reproduce exploit? Exploitability – what is needed to exploit? Affected Users – how many users will be affected? Discoverability – how easy is it to find?  does it matter? Detectability – how easy is it to detect if you’ve been exploited?
  27. Rank according to score Research defense mechanisms, make proposals.
  28. Zoom in/ zoom out repeat
  29. Jan Schaumann
  30. Help your grandmothers/parents/kids/friends. Curse of knowledge. You can’t imagine not knowing. Encourage vulnerable people to seek help