Here are the key points to consider when choosing an appropriate threat model:
- The criticality and sensitivity of assets/data being protected
- Attackers' likely incentives and capabilities given the assets/system in question
- Costs of security measures vs potential losses/damages from attacks
- Operational and technical constraints of the system/environment
There is no single "right" threat model - the goal is to choose a realistic and useful one for security analysis and improvement, not an unachievably strong one. An appropriate balance of protection and practicality needs to be determined based on systematic risk analysis.
Related topics: