“…Cyber threat intelligence refers to the process of "acquiring, processing, analysing, and disseminating information that identifies, tracks, and predicts threats, risks, and opportunities inside the cyber domain to offer courses of action that enhance decision making" (Ettinger, 2019). A number of threat models exist, such as STRIDE, DREAD, P.A.S.T.A, Trike, VAST, Attack Tree, Common Vulnerability Scoring System (CVSS), T-MAP and OCTAVE, to assist in identifying vulnerabilities and mitigating potential threats facing networks, computers, software products, and data (Shostack, 2014, Kotsias et al, 2022Shi et al, 2021). However, these models for the most part focus at an organizational level.…”