Can a technique other than misuse cases be used to model threats in Step 3?
Related Questions
- Is JSD a methodology by itself — or is it a technique used in other methodologies such as the waterfall model, iterative development, rapid prototyping, or extreme programming?
- Where can I find a description of the ocean model used by EdGCMs "Predicted SST (QFlux)" technique?
- Can a technique other than misuse cases be used to model threats in Step 3?