From The Following Choices Threat Modeling