| Example 1 | Resources |
| In this example i have used the structure of a threat model to consider a recent eScooter hack, the Actor types and possible motivations | Scooter Attack Model 1 |
| Example 2 | Resources |
| In this example I have used the structure of a threat model to consider a recent eScooter hack, the Actor types, possible motivations with further examination using Mitre Att&ck | Scooter Attack Model 2 |