Problem 1: Discuss the methods Norman (2016) indicates are most significant for the threat analysis process. Identify, describe, and explain the significance of these methods.
Problem 2: Requires reading Chapter 7 and do additional research of the topic.