A structured process for identifying attackers and cataloging possible threats
Methodologies
STRIDE: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
PASTA: Process for Attack Simulation and Threat Analysis
Trike: Open Source Threat Modelling Process
MAL: Meta Attack Language