1) What is a threat model

A threat model is a simple description of what you are protecting, who or what you are protecting it from, and the smallest set of steps that measurably reduce the most important risks. It turns a vague feeling of worry into a concrete plan you can act on.

Plain-language version

  • Assets the stuff that matters such as accounts, devices, data, identity
  • Threats how things could go wrong such as phishing, theft, malware, account takeover, mistakes
  • Likelihood and impact how likely it is and how bad it would be
  • Controls one or two specific actions that reduce the risk

A tiny example

Asset: Primary email account
Threat: Phishing leading to account takeover
Likelihood: Medium, Impact: High
Controls: Turn on authenticator-app MFA, review forwarding rules monthly

2) Why do a threat model

3) When to do it

4) A quick workflow that works

  1. List your top five assets devices, accounts, or data that would truly hurt to lose
  2. Pick one likely threat for each asset rather than listing every possibility
  3. Rate likelihood and impact using Low, Medium, High, then multiply for a quick score
  4. Choose one small fix that reduces risk right away such as turning on MFA or enabling automatic backups
  5. Assign an owner and a date optional but it turns ideas into action
  6. Print or export to PDF and revisit after you complete the fixes

You can do all of this with the Threat Model Builder in a few minutes.

5) Common misconceptions

6) What good output looks like

7) Privacy and scope

Your model can be personal, family, or business scoped. If it includes sensitive details, store the file securely and avoid emailing it in plain text. The builder runs locally, so nothing is uploaded by default.

© CyberLife Coach — Privacy-first security guidance and tools.