go to ORKG: http://orkg.org/orkg/predicate/P69012

threat model

process by which potential threats, such as structural vulnerabilities can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of view