How threats are modeled

Explain in your own words how threats are modeled and assessed in the cybersecurity