2.2 The steps within a threat model