attached document is all about Computer Security for Nuclear Security. I believe less relevant for most of us here.
however starting at page 67, I found some details that might be relevant for most of us. the Cyberthreats are presented in a very simple manner over table where we can learn what is the threat, what are the skills and tactics required to contact that attack. not less important what are the motivation and intentions of the attacker.
below you can find an example of one of the tables from the document.