the odyssey challenges to model privacy threats in a
play

The Odyssey: challenges to model privacy threats in a brave new - PowerPoint PPT Presentation

The Odyssey: challenges to model privacy threats in a brave new world Rafa Glvez and Seda Grses Motivation imec - ESAT/COSIC, KU Leuven Threat Modeling 1. Characterize the system 2. Identify the threats 3. Threat and Risk analysis


  1. The Odyssey: challenges to model privacy threats in a brave new world Rafa Gálvez and Seda Gürses

  2. Motivation imec - ESAT/COSIC, KU Leuven

  3. Threat Modeling 1. Characterize the system 2. Identify the threats 3. Threat and Risk analysis 4. Validate imec - ESAT/COSIC, KU Leuven

  4. Privacy goals • Confidentiality • Control • Practice imec - ESAT/COSIC, KU Leuven

  5. From waterfall to agile Waterfall Agile imec - ESAT/COSIC, KU Leuven

  6. From monoliths to services imec - ESAT/COSIC, KU Leuven

  7. Modeling threats today imec - ESAT/COSIC, KU Leuven

  8. Traditional TM assumptions imec - ESAT/COSIC, KU Leuven

  9. New reality • Frequent delivery • Working software • New requirements • Face to face meetings • Independent development • Independent deployment • Outsourced functionality to third party services imec - ESAT/COSIC, KU Leuven

  10. TM becomes challenging 1. Characterize the system • Keep the model up to date • Reflect implementation details 2. Identify the threats • Threats can emerge, change of vanish • Deriving threats is slow 3. Threat and Risk analysis • Compositionality of services 4. Validate • Lack of information to automate testing imec - ESAT/COSIC, KU Leuven

  11. Opportunities Agile provides grounds for • Solid and iterative progress • Effective analysis of complex problems Services enable • Verbose documentation • Parallelization imec - ESAT/COSIC, KU Leuven

  12. Conclusions and open problems • Threat Modeling can help to comply with GDPR • Software landscape has changed, traditional TM is challenging • TM methodologies need to take advantage of the new opportunities • Can we automate privacy threat modeling • Can we do Privacy as a service ? imec - ESAT/COSIC, KU Leuven

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend