Different phases of threat modeling