Interaction-Based Privacy Threat Elicitation
Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen 27th April 2018 – IWPE2018 – London, United Kingdom
Interaction-Based Privacy Threat Elicitation Laurens Sion , Kim - - PowerPoint PPT Presentation
Interaction-Based Privacy Threat Elicitation Laurens Sion , Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen 27 th April 2018 IWPE2018 London, United Kingdom Importance of Considering Privacy by Design Number of Data Breaches
Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen 27th April 2018 – IWPE2018 – London, United Kingdom
2 10 20 30 40
Number of Data Breaches
5 (full bank account details) 4 (E.g., health records) 3 (E.g., creditcard info) 2 (SSN, personal details) 1 (E.g., email, online info) Data: Information is beautiful: World's Biggest Data Breaches
3 Data: Information is beautiful: World's Biggest Data Breaches 10 100 1000 10000 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
Millions
Number of records lost
4
GDPR mandates privacy by design
5
6
Identify issues
7
Identify issues
Demonstrate compliance
8
9
Model the system
Map the LINDDUN threat types to the model
Elicit and document privacy threats
Model
10
2. Portal 3. Service
network data
Model the system
11
Model the system
Map the LINDDUN threat types to the model
Elicit and document privacy threats
Map
12
Map the LINDDUN threat types to the model
Map
13
Map the LINDDUN threat types to the model
2. Portal 3. Service
network data
L I N D D U N Data store X X X X X X Data flow X X X X X X Process X X X X X X Entity X X X
MAPPING TEMPLATE Threat target L I N D D U N Data store
Social network db X X x x X X*
Data flow User data stream (user- portal)
...
Map
14
Map the LINDDUN threat types to the model
2. Portal 3. Service
network data
L I N D D U N Data store X X X X X X Data flow X X X X X X Process X X X X X X Entity X X X
MAPPING TEMPLATE Threat target L I N D D U N Data store
Social network db X X x x X X*
Data flow User data stream (user- portal)
...
Map
15
Map the LINDDUN threat types to the model
2. Portal 3. Service
network data
L I N D D U N Data store X X X X X X Data flow X X X X X X Process X X X X X X Entity X X X
MAPPING TEMPLATE Threat target L I N D D U N Data store
Social network db X X x x X X*
Data flow User data stream (user- portal)
...
Map
16
Map the LINDDUN threat types to the model
2. Portal 3. Service
network data
L I N D D U N Data store X X X X X X Data flow X X X X X X Process X X X X X X Entity X X X
MAPPING TEMPLATE Threat target L I N D D U N Data store
Social network db X X x x X X*
Data flow User data stream (user- portal)
...
Map
17
Map the LINDDUN threat types to the model
2. Portal 3. Service
network data
L I N D D U N Data store X X X X X X Data flow X X X X X X Process X X X X X X Entity X X X
MAPPING TEMPLATE Threat target L I N D D U N Data store
Social network db X X x x X X*
Data flow User data stream (user- portal)
...
18
Model the system Map the LINDDUN threat types to the model
Elicit and document privacy threats
Elicit
19 Threat target L I N D D U N Data store
Social network db X X x x X X*
Data flow User data stream (user- portal)
...
Elicit and document privacy threats
MITIGATION TAXONOMY MITIGATION TAXONOMY THREAT TREE CATALOG
Elicit
20 Threat target L I N D D U N Data store
Social network db X X x x X X*
Data flow User data stream (user- portal)
...
Elicit and document privacy threats
MITIGATION TAXONOMY MITIGATION TAXONOMY THREAT TREE CATALOG
21
Model the system
Map the LINDDUN threat types to the model
Elicit and document privacy threats
› Linkability › Identifiability › Non-repudiation › Detectability › Disclosure of Information › Unawareness › Non-compliance
22
23
Process B A
24
Process B A
25
Process B A
26
Process B A
27
Process B A
28
29
Client Server
30
Client Server
31
Client Server
32
Client Server
33
Client Server
34
35
Client Server
More explicit and precise
36
Client Server
Client Server
Client Server
Client Server
45
46
47 Website (S) showing incorrect password error reveals account existence.
48
49
50
51
52
53
54
55
56
57
58
59
60
Thank you!
Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen