In the security, privacy, and counter-abuse professions, the term threat modeling describes the process of identifying, assessing, and addressing potential threats to a system. This process starts by answering two questions: "how can our system be abused" and "who would want to abuse us in that way". Understanding the who is critical because different entities have wildly different levels of technical sophistication, adaptability, patience and resources to dedicate to their objective. For example:
These are just two examples of how looking at abuse through the actor can be a powerful vantage point. As you look through each collection, note the similarities in mechanism, cause, and motivation in the harms that these actors are responsible for.