Forem

SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM

Posted on

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Before we start , just quick reminder it’s Threat Modeling not Modelling.

Now let recall basic fundamental definition of Threat Modeling viz a process used in cybersecurity to identify and evaluate potential security threats to a system. The goal is to understand possible vulnerabilities and take measures to mitigate them.

Uhh enough talk let’s see real in world

Imagine your home as a system. You would want to identify all possible ways a burglar could break in and take steps to secure those entry points.

Now our main topic

Why "Think Like an Attacker" is Harmful?

Many cybersecurity experts suggest that to effectively model threats, one should "think like an attacker." However, this advice can be misleading for several reasons:

1. Complexity of Attacker Mindset:

Trying to think like a skilled attacker is like a home cook trying to understand the challenges of a professional chef. Chefs deal with complexities like ordering ingredients and managing staff, which home cooks don’t face. Similarly, attackers use advanced techniques and tools that most people wouldn’t understand.

2. Assumptions and Biases:

Trying to guess how an attacker thinks can lead to wrong assumptions about their goals and methods. These incorrect assumptions might make you focus on the wrong dangers. It's like thinking all burglars will use the front door, while ignoring that they can also enter through windows or back doors.

3. Focus on Threats, Not Attackers:

Rather than trying to think like a hacker, it’s better to look for possible threats and weaknesses in your system. This way, you can spot a wider range of potential security issues. Imagine securing your home: instead of guessing what a burglar might do, just make sure all the doors and windows are locked, the alarm system works, and you don’t leave any valuables in plain sight. This approach helps you cover all bases and keep your home safer.

Thanks for reading. I’m open for the discussion around threat Modeling and will be contd this series!
Cheers!

Top comments (0)