1.1.1 What is a Threat Model?

A threat model identifies the following key elements:

  • Assets at risk, including firmware, cryptographic keys and user data
  • Potential actions by adversaries, such as tampering, extracting, replacing or intercepting
  • Adversaries' capabilities, such as physical or network access