In the Monitoring Systems section of this lecture (attached), we mentioned that: It should be noted that these example protocols are not really related to computer systems. However, the principles are the same. From analysis of these protocols, we can learn that threat models play an important role in the process of building a secure system. Is this comment meaningful?