Figure 3From: Risk-driven security testing using risk analysis with threat modeling approach Overall system design. Back to article page