Intro to Threat Modeling: Know What You’re Protecting

Close-up view of a mouse cursor over digital security text on display.

Cybersecurity isn’t just about tools — it’s about thinking clearly about what you’re protecting, from whom, and why. That process is called threat modeling, and it helps you make smarter, more focused decisions about your digital safety.

You don’t need to be a hacker or expert to do it — just honest and strategic.

Why It Matters?

Threat modeling is the process of answering four essential questions:

  1. What do I want to protect? (Assets)
  2. Who do I want to protect it from? (Adversaries)
  3. How likely is it that I’ll need protection? (Likelihood/Risk)
  4. How much effort am I willing to put in? (Trade-offs)

These questions let you build personalized security — not one-size-fits-all rules.

Step 1: Define Your Assets

Think about what matters most to you digitally:

  • 📁 Personal files (photos, documents, backups)
  • 🧾 Financial information (bank logins, crypto wallets)
  • ✉️ Communication (emails, messages, contacts)
  • 👤 Identity data (ID scans, address, SSN/passport)
  • 🧠 Intellectual property (projects, code, research)

🧠 Ask: “If this were exposed, stolen, or deleted — what would happen?”

Step 2: Identify Potential Threat Actors

Who might want to access or harm your data?

Threat ActorExamples
CriminalsHackers, scammers, ransomware groups
CorporationsData miners, ad networks, trackers
GovernmentsSurveillance agencies, law enforcement
InsidersEx-partners, coworkers, roommates
Random attacksPhishing, malware, credential stuffing

Each actor has different motives, tools, and capabilities.

Step 3: Assess Likelihood and Risk

Not every threat is equally likely. Consider:

  • 📍 Your location (e.g., repressive regimes, high-surveillance countries)
  • 💼 Your job (e.g., journalist, lawyer, activist)
  • 📊 Your digital habits (e.g., reuse passwords, overshare online)

🎯 Focus your energy on likely threats with high impact.

Step 4: Choose Appropriate Protections

Based on your risk level, prioritize safeguards like:

Risk LevelSuggested Measures
LowUse password manager, 2FA, update software regularly
MediumAdd local encryption, secure cloud backups, private browser
HighUse GrapheneOS, VPN, Tor, encrypted comms, threat isolation

💡 Start small — you don’t need to be “NSA-proof” unless you’re actually a target.

Threat Modeling in Practice – Examples

🎨 Casual User

  • Asset: Personal photos
  • Threat: Lost phone or malware
  • Protection: Encrypted cloud backups, strong phone PIN

📢 Activist

  • Asset: Contacts and chat logs
  • Threat: Government surveillance
  • Protection: Use Signal, VPN, avoid Google services

💼 Freelancer

  • Asset: Client data, invoices
  • Threat: Ransomware or phishing
  • Protection: Regular offline backups, phishing awareness training


Further Resources

Tactical Tech – Data Detox Kit

PrivacyGuides – Threat Modeling

Mozilla Foundation – Privacy Not Included

Scroll to Top