2.3 Evaluate a threat model