1.1.1 What is a Threat Model?
A threat model identifies the following key elements:
- Assets at risk, including firmware, cryptographic keys and user data
- Potential actions by adversaries, such as tampering, extracting, replacing or intercepting
- Adversaries' capabilities, such as physical or network access
