This method intends to:
Method OverviewDesign Phase:
The Security and Privacy Threat Discovery Cards encourage you to think broadly and creatively about computer security threats. Explore with 42 cards in 4 categories: Adversary's Motivations, Adversary's Resources, Adversary's Methods, and Human Impact, or use the included templates to make custom cards.
Framework of ethics used
Explore all intentions of this method
The Security Cards can be used for a wide range of purposes and in a wide range of contexts. For example, the cards could be used by students to learn about security threats, by professional software and hardware developers for training and to surface threats in system design, and by project, teams to communicate about potential security threats with management and others. Below we offer two step-by-step activities and several extensions for using the Security Cards for educational and training purposes in academic and industry settings.
Suggested use here: The Security Cards