TR3.5

Threat Modeling

Huxley Marvit 2021-09-27 Mon 12:00

Table of Contents

#ret


1 Voice assistant

  1. What are we protecting?
    1. User privacy and data
    2. User mental space (advertising)
    3. Peace of mind
    4. Product and brand
    5. Protect external agendas
      • brand ecosystem, publicity
    6. User entry points
    7. User resources (energy)
  2. Who are we protecting it from, and what are their motivations?
    1. Data miners
      • Money (companies) or personal gain (blackmailers)
    2. Advertisers
      • Money
    3. Foreign state actors
      • Gaining influence
    4. Physical attackers
      • "Alexa, open the pod bay doors." Digital entry point to physical resources
    5. Misinformed users
      • To help
    6. Accidental users
      • !voice assistant actions
    7. Trolls
      • Fun
    8. DDOSers
      • Bot net
  3. What methods of attacks do we prevent?
    1. External system hijacking (remote control)
    2. Unauthorized activation for certain actions
    3. Exploitation of security vulnerabilities for accessing user data and creating bot nets
  4. What are the possible effects of these attacks?
    1. Damaged financial well being
    2. Damaged emotional well being
    3. Damaged physical well being
    4. Damage to company brand / ecosystem
  5. What are their resources?
    1. Expertise and platform
    2. Potential for money
      • Which is a commodity
    3. Exploitable users
    4. Some have financial resources
  6. What are our resources?
    1. Massive company
      • Funding
      • Workers
      • Smart people
      • Infrastructure
    2. Potential for exploitation / damage
    3. Intended access to our product
  7. What should we do?
    1. Educate users
    2. Authorization
    3. Multi-step confirmations / actions for potentially damaging actions
    4. Patch programmatic security vulnerabilities
    5. Look secure
    6. High reward for finding vulnerabilities