Understanding who might want to compromise your application and how they might do so is key to
defending yourself. Threat-modeling is the process by which potential threats, such as
structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated,
and mitigations can be prioritized.