A framework for understanding how privacy or security of a system might be breached.
See also: ATTACK VECTOR, SCENARIO ANALYSIS, THREAT MODEL
Character limit 500/500