Week 3 - What do I have or create?
Last week, I mentioned several websites where we can go to look for information. Now, let’s get started with the first step in threat modeling, know your network (what do I have or create? ) . It sounds simple, isn’t it? At the abstract level, it is indeed simple. We just lay out what we have. Well, it is not that straightforward. What we do in this step directly depends on the type of threat model we choose. There are a few ways to threat model. I list each of them with brief descriptions below: Asset centered method – Focus on assets to find possible threats and to develop protection. For example, I want to protect my multifunction printer from the thief ; what are possible ways that my printer can be stolen or damaged. Attacker centered method – Focus on the attacker’s skill, motivation, behavior, and characteristics. Given the printer is connected to the network inside the home; what type of at...