A good place to start when modeling threats is sketching out a data-flow diagram, often used by systems
engineers to illustrate the data flows, data stores, processes, interactions and trust-boundaries that make up the
application. Such a diagram will illustrate various access points that may act as attack vectors, and illustrate where
malicious input may enter the system.