Threat Modeling and Risk Assessment: A Step-by-Step Example