By way of Dana:
"To protect your applications from hackers, you have to understand the threats to your applications. Threat modeling is comprised of three high-level steps: understanding the adversary’s view, characterizing the security of the system, and determining threats. The resources on [Microsoft's] page will help you understand the threat modeling process and build threat models that you can use to secure your own applications."
- Taken from Microsoft's Threat Modeling Page