PIRF Profiles
PRIF Profiles are a set of pre-built personal threat models1 you can use and adapt. They are intended as a starting point for anyone interested in improving their personal security and privacy. This list is by no means extensive but should cover the needs of most.
Low Risk
| Persona | Common Threats | Specific Concerns |
|---|---|---|
| The Plumber | Identity theft, phishing, online scams | Protecting personal and family information, safe online shopping |
| The Young Student (and parents) | Cyberbullying, online predators | Safe internet use, protecting personal information, parental supervision |
| The Wise Ones (Seniors) | Scams, identity theft, phishing | Protecting financial info, avoiding fraud, coping with tech changes |
Medium Risk
| Persona | Common Threats | Specific Concerns |
|---|---|---|
| College Student | Phishing, identity theft, social media risks | Securing devices, protecting academic records |
| Healthcare Worker | Phishing, ransomware, data breaches | Protecting patient info, secure workplace habits, separating personal/work |
| Educator/Teacher | Phishing, data breaches, cyberbullying | Securing student info, safe tech use in class, managing student cyber issues |
| Creative Professional | IP theft, phishing, online scams | Protecting creative works, securing online presence |
| Digital Nomad | Public Wi-Fi threats, identity theft | Securing devices while traveling, protecting personal info |
| Nonprofit Worker/Volunteer | Phishing, targeted attacks, data breaches | Protecting donor data, securing organizational information |
| Remote Worker/Freelancer | Phishing, insecure setups, data breaches | Securing home workspace, protecting client data |
High Risk
| Persona | Common Threats | Specific Concerns |
|---|---|---|
| Doctor | Ransomware, medical ID theft | Patient confidentiality, securing health records |
| Attorney | Client data breaches, phishing | Protecting privileged comms, secure document handling |
| Engineer/Scientist | IP theft, phishing, espionage | Securing research data, protecting proprietary info |
| Small Business Owner | Ransomware, data breaches, fraud | Securing business/customer data |
| Public Sector Employee | Espionage, targeted attacks | Securing government info, managing classified/sensitive data |
| Journalist/Reporter | Espionage, data breaches, harassment | Protecting sources, secure communication |
| Activist/Advocate | Harassment, doxxing, targeted attacks | Protecting identity, secure comms, physical safety |
| High Net Worth Individual | Financial fraud, targeted attacks, identity theft | Securing personal/financial/family info, physical security |
| Technologist/IT Professional | Phishing, data breaches, insider threats | Securing systems, separating personal/professional security contexts |
| Military Personnel/Veteran | Espionage, identity theft, targeted surveillance | Protecting sensitive info, securing personal comms and devices |
-
Threat models help you define what threats are of concern for your. See more in prevention. ↩