http://h7isucmawckzflxhipflydxvxpaytk5fozfk5immffg66rhboc74yxyd.onion/doku.php?id=threat_modelling&rev=1565378327
Once you’ve identified why you might be of interest, and who you might be defending against, the next step is to identify how you might be vulnerable. You might find the European Union Agency for Cybersecurity's threat report to be useful in identifying key threats. Prioritise your response Chances are, you'll have quite a few risks on your list, so you'll want to prioritise your approach to tackling them.