This is a worked example of the Quick Secure By Design Playbook for a home network, so that you can see how it works for something familiar.
Bear in mind that for home or small office networks, or other ‘standard’ situations, then standard checklists or guidelines such as the UK NCSC Cyber Essentials may be faster and clearer.
For example in our home networks we will have sensitive personal information about our families on home laptops or phones, some valuable gaming devices, and probably access to our financial assets at a bank. For each of these consider what the impact would be if you didn’t have it any more, or if someone got a copy of it, or somebody fiddled with it. [read more]
Asset | Uses | Nicked | Bricked | Tricked |
---|---|---|---|---|
Work Laptops | Arthur uses for work in the living room, Betty in the spare bedroom | Our competitors gain advantage. I lose a few days work to get it replaced | I lose a few days work get it replaced | Phishing attack means I send some |
Financial information | Arthur and Betty use phone apps to manage accounts | Lost money | Cannot make payments for a few days | Make payments to the wrong people; lost money |
School Reports | School and parent use to communicate Jonny’s lack of progress | Jonny’s reputation reduced | We can’t track Jonny’s progress | Jonny’s hacked the school sharepoint again. Four points to huffleslyth |
PlayXBoy 5000Kz | Arthur plays games | Arthur can’t play games | No one can play games | Arthur thinks he’s good at games |
We draw out each device in our house, and then draw a line between it and the router that it connects to, depending on whether it is wifi (orange) or cable (blue). You should also include visitor and guest devices.
For this playbook we focus on threat actors: people and groups that deliberately or accidentally