Chapter 16: Modeling Security Threats Modeling Servers Modeling Networks Modeling Threats Threat Prioritization Vulnerability Assessment Modeling Person Roles Monitoring Agents Modeling Unusual Data Movement