How to Implement a Threat Modeling Framework to Identify Potential Attack Vectors and Vulnerabilities