This interactive workshop covered what's known as "threat modeling" in the computer security world. The goal was to help participants understand how networks view them as users, how they can shape what a network sees and how to realistically defend themselves against common attacks. They covered some security tools and techniques, but the class was focused on understanding the networked environment well enough that attendees could tailor these to their particular situation. First, they looked at the networks we use every day, how we relate to them and how they are used by others. Next, they went over some real-world attack examples that range from direct hacking, traffic analysis and implicit information to jurisdictional attacks, such as subpoenas. The last third of the workshop was an open discussion where participants could talk about their specific needs and potential next steps.