nSecurity design by
Threat Modelling:
nBrainstorm the
known threats to the system
nRank the threats by
decreasing risk
nChoose how to
respond to the threats
nChoose techniques to mitigate
the threats
nChoose the
appropriate technologies from the identified
techniques
n