There are many different Threat Modeling methodologies. One of the more common is known as STRIDE.
S - Spoofing
T - Tampering
R - Repudiation
I - Information disclosure / leakage
D - Denial of service
E - Elevation of privilege
These are all different threats that you should assess your application to ensure it is robust enough to defend against them.