Understanding who might want to compromise your application and how they might do so is key to
defending yourself. Threat-modeling is the process by which potential threats, such as structural vulnerabilities
or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.