
Make a list of your assets: data that you keep, where it’s kept, who has access to it, and what stops others from accessing it. For example, your emails, contact lists, instant messages, location, and files are all possible assets. In the context of digital security, an asset is usually some kind of information. What do I want to protect?Īn “ asset ” is something you value and want to protect. Let’s take a closer look at each of these questions. How much trouble am I willing to go through to try to prevent potential consequences?.How likely is it that I will need to protect it?.How bad are the consequences if I fail?.When building a threat model, answer these five questions: Threat modeling helps you identify threats to the things you value and determine from whom you need to protect them. What is threat modeling and where do I start? Anchor link But, if the risk is high, you’ll want to get the best lock on the market, and consider adding a security system.īuilding a threat model helps you to understand the unique threats you face, your assets, your adversary, your adversary’s capabilities, and the likelihood of risks you face. If your possessions are valuable, but the risk of a break-in is low, then you may not want to invest too much money in a lock. Once you have asked yourself these questions, you are in a position to assess what measures to take. Am I willing to buy a safe for sensitive documents? Can I afford to buy a high-quality lock? Do I have time to open a security box at my local bank and keep my valuables there?.How much trouble am I willing to go through to prevent these consequences? Do I have anything in my house that I cannot replace? Do I have the time or money to replace these things? Do I have insurance that covers goods stolen from my home?.Does my neighborhood have a history of burglaries? How trustworthy are my roommates/guests? What are the capabilities of my adversaries? What are the risks I should consider?.How likely is it that I will need to protect it? Adversaries could include: burglars, roommates, or guests.Assets could include: jewelry, electronics, financial documents, passports, or photos.What do I have inside my home that is worth protecting? What might threat modeling look like? Let’s say you want to keep your house and possessions safe, here are a few questions you might ask:
#Adium icon keeps appearing mac how to
This guide will teach you how to threat model, or how to assess your risks for your digital information and how to determine what solutions are best for you. This process is called “threat modeling.” You can counter the threats you face by determining what you need to protect and from whom you need to protect it. In computer security, a threat is a potential event that could undermine your efforts to defend your data.


It begins with understanding the unique threats you face and how you can counter those threats.
#Adium icon keeps appearing mac software
Security isn’t about the tools you use or the software you download. But, do not fear! Security is a process, and through thoughtful planning, you can assess what’s right for you. Trying to protect all your data from everyone all the time is impractical and exhausting.
