Once you identify likely threat/vulnerability pairs, you can implement mitigation techniques.
Mitigation techniques are technologies used in radio communications to minimize the interference from a radio transmitter to other users. Hence, The current configuration of the system should be ensured when defining the system for the risk assessment.