Threat Evaluation of Enterprise Utilizations via Graphical Modeling