I was conceptualizing common threats, threat vectors and assets in an enterprise a potential hacker is after. This was part of a much larger deck I had intended to present but I have no recollection of where the presentation is — not my local drive, not my mailbox, not on shared drivers.
This is the only image I have and sometimes best left for others to take the concept forward. So here it is — use it as you please. Please retain my name — some day when I am famous, you may want to claim that you know me :)