Purpose of a secure design hackathon
Insecure design is now included as number 4 in the OWASP Top 10 Web Application Security Risks. The purpose of these Hackathons is to allow security learners at all levels to think outside the box about solving real-world problems.
The types of hypothetical systems or applications are meant to be themes, with multiple applications of their kind, already on the market, with many users. The point of the activity is centered around community-building, and the challenges are meant to facilitate creative though processes, not develop actual applications or products.
The Hackathon are intended to be fun and collaborative, and a good way to connect like-minded individuals and provide a chance for them to build up their project portfolio, on their GitHub accounts and/or YouTube and/or other social media platforms.
Who should participate in this type of hackathon?
Any individual interested to learn about security, or just think about solving real world problems in technology. The structure of each of these Hackathons allow for complete beginners to participate. The problems to solve and questions asked are very high-level and open-ended, in order to encourage diverse perspectives.
General structure of a hackathon
Assignment
Things for participants to consider and explain in written form:
Deliverables participants may want to submit
Very basic threat modeling related questions to consider, regardless of submission format (Thank you, Adam Shostack, for advising on these question choices)
Some basic questions for a Risk Analysis Team (taken from Phil Martin’s “Simple CISSP” by Phil Martin) may include:
Recognition of Submissions
If you choose to contribute a attack trees or data flow diagram (DFD) to the OWASP Threat Modeling Cookbook project… Congratulations! You will officially be an OWASP project contributor. :)
If you choose to submit a text document or another type of diagram, I will Tweet the link to your submitted GitHub repository and post it to the Activities page of the OWASP Women in AppSec, Diversity and Inclusion GitHub repository.
**Option to submit a pull request to the OWASP Threat Modeling Cookbook project
If you choose this option, please
Before participating, participants are prompted to check the following Creative Commons licensing information.
Past Hackathons