Jurassic Threat Models
Hello Protocols, Packets, and Programs,
Let’s continue our hacking movie marathon.
This month marks the 30th anniversary of Jurassic Park.
It’s an excellent reference for threat modeling. Imagine –
Confidentiality with an insider selling trade secrets. Oh, Nedry…
Integrity of controls on dinosaurs breeding. To quote Malcolm, “Life, uh…finds a way.”
Availability in the electrified fence. Hello, velociraptors.
But what rings most true is that the park’s computer system has about two million lines of code and if a code review was the only way to turn the safety systems back on, everyone would have died.