A couple of weeks ago I posted my introduction to threat modeling. Several times in that post I mentioned the concept of profile elevation, and it will certainly be coming up more as I flesh out my thoughts on threat modeling. It has occurred to me that this topic should be explored more fully.
Threat Modeling: An Introduction
I have previously written about categorizing attackers based on their levels of skill and focus. I have also written about categorizing security measures to defeat attackers with a given level of skill or focus. Both of these posts tie in closely with (and were early attempts at) a topic that I want to explore more fully in coming months: threat modeling.
Security Measures Categorized
On this site I talk about a number of different security measures. Just as in my discussion of attacks and attackers it is important to have a firm understanding of security measures and exactly what type of security each provides. . . and does not provide.
Attacks and Attackers, Categorized
In previous posts I have referenced two different types of attacks: opportunistic and focused. These categories apply to attacks of all kinds, physical and digital, an understanding them is important to fully understanding how to defend against them. This post will attempt to categorize these two types of attack and the attackers that may carry out each.
Lock Safari: Vancouver, B.C.
I recently had the opportunity to spend an extended weekend in Vancouver, BC. While there, I indulged my desire to run around the city and its seedier parts to look for interesting locks. “Lock Safari Vancouver” was a success – I found some very interesting stuff! This post will be divided into two parts. This first half will cover the more “pedestrian” Abloy, ASSA, and Medeco products. Part II will cover the more odd and interesting.