What is threat modeling?
Completion requirements
View
A threat model is a list of the most probable threats to your security and privacy endeavors. In this short guide we'll cover the questions you'll need to ask to create this list.
2. Creating a threat model
2.5. Put in a reasonable effort
There is no perfect option for security. Consider how much trouble you're actually willing to go through to eliminate these risks. Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy.
For example, an attorney representing a client in a national security case may be willing to go to greater lengths to protect communications about that case, such as using encrypted email, than a mother who regularly emails her daughter funny cat videos.