What is threat modeling?
Completion requirements
View
A threat model is a list of the most probable threats to your security and privacy endeavors. In this short guide we'll cover the questions you'll need to ask to create this list.
2. Creating a threat model
2.2. Who you want to protect it from
To answer this question, it's important to identify who might want to target you or your information. A person or entity that poses a threat to your assets is an “adversary”. Examples of potential adversaries are your boss, your former partner, your business competition, your government, or a hacker on a public network.
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.