Moodle Threat Modeling
In Chapter 1, we learned that security threats are in no way new and that security needs to be factored into any Moodle project right from the start. So, knowing that designing for security is vital to any Moodle deployment, how do we actually identify those threats? In this chapter, we introduce the concept of threat modeling, a set of tools and techniques we can use to identify threats, which was originally outlined by Adam Shostack in his book, Threat Modeling: Designing for Security. As we introduce this chapter, we remember the words of US economist Thomas Schelling:
Often, in conversations where security incidents are discussed, I hear sentences beginning with “I’m surprised they didn’t consider...” But should we be surprised? Again, just because a threat immediately occurs to you doesn’t mean to say it crossed the minds...