1 / 2100%
The threat modeling process is used to minimize the things in the network
environment that can cross the threat surface. In other words, to avoid the exposed
vulnerability of becoming an actual threat.
Willis, M. (2019). (ISC)2 SSCP Systems Security Practitioner Official Study Guide.
Wiley.
Identify security objectives.
For a residential approach, the security objectives would be to remove or update
unsupported operating systems from the network and teach the family the
importance of security.
Identify assets and external dependencies.
In this step, it is important to identify anything that can put the home network at risk.
An example of this is making sure that all the devices are updated. Since a home
network is not as critical as a business one, the recommendation would be for
automatic updates.This will ensure that Internet of Things devices like Google
Home, Wireless Camera, Smart Vacuum Cleaners are always updated. If these
devicescannot support automatic updates, then check for updates at the end
of each month.(In a business environment, updates are regularly testedbefore
being released to the whole organization in order to avoid issues with applications,
connectivity, etc.)
Identify trust zones
Some of the trust zones that can be taken into consideration are devices that are in
the private network and in the same VLAN. When it comes to a home network it has
to be taken into consideration the fact that people work from home as well. So, it
would be an added value for creating a VLAN for those work devices in order to
protect them even more.
Identify potential threats and vulnerabilities.
Potential threats and vulnerabilities would be the fact that the people in the home
share the main wireless password. In order to avoid this, it would be a good idea to
set a guest Wi-Fi, so the family members do not feel pressure to share the main
password when a guest asks for one. In addition to this, the guest Wi-Fi is set in a
different VLAN in which one cannot see the main devices in the home. Removing
administrator rights to the user account is a step in the right direction. It would be
better to enable the administrator account on each computer and leave the user
account as a standard. This will avoid potentially installing a malicious program by
mistake if the antivirus does not quarantine it or block it. Another thing would be to
train family members in the basics of security. For example, to understand what
phishing attacks are and how to identify them.
Document your threat model.
Most residential networks depending on the level of services and devices can be
said to have fewer complex requirements. One example to document this would be
to log into your network device (Wi-Fi Router, etc.), review each device connected,
identify them, and take a snapshot of those devices. Make a habit of reviewing the
connected device history to see if any new unauthorized device has connected.
Students also viewed