Threat Modeling – 6 Steps for Secure Data Assets
https://threatmodeler.com/six-steps-to-threat-modeling-for-secure-data-assets/ NOTE: Practical examples and more information is available at MITRE ATT&CK: https://attack.mitre.org/resources/getting-started/ Threat modeling is the process of adopting a strategic, risk-based approach to