Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Well done!
      You have completed Security Literacy!
      
    
You have completed Security Literacy!
Preview
    
      
  Learn to create and apply a defensive framework used by security professionals in many industries. This video will explain how it's really just an extension of behaviors you already do.
New Terms:
- Threat Model -- A conceptual framework to identify assets and risks, possible mitigations, and optimizations.
- Actors -- The people, agencies, or devices involved in the threat model.
- Risks -- The vulnerabilities related to exposure or loss of assets.
- Assets -- The people, resources, or possessions you wish to protect.
- Mitigations -- The possible strategies for prevention or minimization of risk
- Breach -- An event where assets were lost or exposed, through failure of mitigations or other protections.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
                      Now that we've explored how common
traffic flows through the Internet and
                      0:00
                    
                    
                      the kinds of information
attached to that traffic,
                      0:03
                    
                    
                      we can make some informed decisions
about our online activity.
                      0:06
                    
                    
                      One way to establish some secure practices
is to create what's called a threat model.
                      0:10
                    
                    
                      This is a defensive framework used by
security professionals in many industries.
                      0:15
                    
                    
                      But don't let that intimidate you.
                      0:20
                    
                    
                      It's really just thinking
through behaviors and
                      0:21
                    
                    
                      attitudes that you already
do on a daily basis.
                      0:24
                    
                    
                      First, let's establish
some threat model basics.
                      0:27
                    
                    
                      Creating a thought model is asking
yourself a set of questions.
                      0:31
                    
                    
                      Who would be most likely to target me?
                      0:34
                    
                    
                      A repressive government, organized crime,
corporations, my ex, my coworkers.
                      0:36
                    
                    
                      How much money, time, and
                      0:43
                    
                    
                      skill do they have to dedicate to target
me, an important aspect of this activity.
                      0:45
                    
                    
                      What would they most likely want from me?
                      0:49
                    
                    
                      Money, incriminating information,
access to trusted contacts.
                      0:52
                    
                    
                      How much effort am I willing
to put into protecting it?
                      0:57
                    
                    
                      Is this worth the effort?
                      1:00
                    
                    
                      What would happen to me
if they were successful?
                      1:01
                    
                    
                      It's all about being prepared.
                      1:05
                    
                    
                      Number 1 is about identifying
the actors in the model.
                      1:07
                    
                    
                      Number 2 is about identifying
the risks in the model.
                      1:11
                    
                    
                      Number 3 is about identifying
the assets in the model.
                      1:15
                    
                    
                      Number 4 is about prioritizing
your concerns with mitigations.
                      1:18
                    
                    
                      Number 5 is about planning for breach.
                      1:22
                    
                    
                      As I mentioned earlier,
most of these really are questions you've
                      1:25
                    
                    
                      already asked yourself in some form or
another.
                      1:28
                    
                    
                      This process is just collecting
them together for risk analysis.
                      1:31
                    
                    
                      Consider when you leave your home in
the morning to go to work or school.
                      1:36
                    
                    
                      Do you lock your door?
                      1:39
                    
                    
                      You've likely decided that the effort to
lock the door is worth protecting the risk
                      1:41
                    
                    
                      for a burglary through the door.
                      1:46
                    
                    
                      You've identified the actors as burglar,
but the front door provides
                      1:47
                    
                    
                      a vulnerability or risk that your
valuable possessions are the assets.
                      1:52
                    
                    
                      You've established the lock as
a risk mitigation strategy.
                      1:57
                    
                    
                      And you'll likely have an understanding
that you can call the police
                      2:01
                    
                    
                      should you find out that you've been
breached and had your things stolen.
                      2:04
                    
                    
                      An important aspect of this is
to point out that there is no
                      2:09
                    
                    
                      one mitigation strategy that
can protect against all risks.
                      2:12
                    
                    
                      You choose the ones
that fit the task best.
                      2:16
                    
                    
                      For example, that lock on the door
may keep out a casual burglar, but
                      2:19
                    
                    
                      not a dedicated one that
chooses to break a window.
                      2:24
                    
                    
                      So now you add some bars on your windows.
                      2:27
                    
                    
                      Well locks and bars do nothing to protect
those same assets against a fire.
                      2:30
                    
                    
                      Of course, the most convenient thing would
be to not have to lock your door at all.
                      2:35
                    
                    
                      But as always, it's a trade off
between security and convenience.
                      2:40
                    
                    
                      Your online security can gain a lot
from the same threat model treatment.
                      2:45
                    
                    
                      And, in fact,
you're already doing this as well.
                      2:49
                    
                    
                      The fact that you use a password to
protect an account is a mitigation itself.
                      2:51
                    
                    
                      It's also pretty analogous
to the door lock.
                      2:56
                    
                    
                      If you use the same key for
your door as your dead bolt and
                      2:59
                    
                    
                      back door, you'll have to change
every lock even if you lose one key.
                      3:02
                    
                    
                      By viewing your own online activity
through the lens of a threat model,
                      3:07
                    
                    
                      you can really identify
your own threats and
                      3:11
                    
                    
                      prioritize the effort you want to
make to help protect yourself.
                      3:13
                    
                    
                      In the next stages, we'll dive deep
into other actors and risks and
                      3:18
                    
                    
                      offer some solid mitigations so
you're prepared.
                      3:21
                    
              
        You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up