Skip to content

PIRF Profiles

PRIF Profiles are a set of pre-built personal threat models1 you can use and adapt. They are intended as a starting point for anyone interested in improving their personal security and privacy. This list is by no means extensive but should cover the needs of most.

Low Risk

Persona Common Threats Specific Concerns
The Plumber Identity theft, phishing, online scams Protecting personal and family information, safe online shopping
The Young Student (and parents) Cyberbullying, online predators Safe internet use, protecting personal information, parental supervision
The Wise Ones (Seniors) Scams, identity theft, phishing Protecting financial info, avoiding fraud, coping with tech changes

Medium Risk

Persona Common Threats Specific Concerns
College Student Phishing, identity theft, social media risks Securing devices, protecting academic records
Healthcare Worker Phishing, ransomware, data breaches Protecting patient info, secure workplace habits, separating personal/work
Educator/Teacher Phishing, data breaches, cyberbullying Securing student info, safe tech use in class, managing student cyber issues
Creative Professional IP theft, phishing, online scams Protecting creative works, securing online presence
Digital Nomad Public Wi-Fi threats, identity theft Securing devices while traveling, protecting personal info
Nonprofit Worker/Volunteer Phishing, targeted attacks, data breaches Protecting donor data, securing organizational information
Remote Worker/Freelancer Phishing, insecure setups, data breaches Securing home workspace, protecting client data

High Risk

Persona Common Threats Specific Concerns
Doctor Ransomware, medical ID theft Patient confidentiality, securing health records
Attorney Client data breaches, phishing Protecting privileged comms, secure document handling
Engineer/Scientist IP theft, phishing, espionage Securing research data, protecting proprietary info
Small Business Owner Ransomware, data breaches, fraud Securing business/customer data
Public Sector Employee Espionage, targeted attacks Securing government info, managing classified/sensitive data
Journalist/Reporter Espionage, data breaches, harassment Protecting sources, secure communication
Activist/Advocate Harassment, doxxing, targeted attacks Protecting identity, secure comms, physical safety
High Net Worth Individual Financial fraud, targeted attacks, identity theft Securing personal/financial/family info, physical security
Technologist/IT Professional Phishing, data breaches, insider threats Securing systems, separating personal/professional security contexts
Military Personnel/Veteran Espionage, identity theft, targeted surveillance Protecting sensitive info, securing personal comms and devices

  1. Threat models help you define what threats are of concern for your. See more in prevention