Back to all activitiesRoadmap DevelopmentSummaryConsiderationsWalk ThroughFootnotes1 See: "Threat Modeling: Designing for Security" by Adam Shostack, p. 298.