¨Identify the possible compromises (threats)
¨Identify the scope of the analysis
–What is “outside the system”
–What assumptions are made about the environment in which the system is operated?
¨For each, scope out the perpetrators, the likelihood, and the expense if this threat becomes real.
¨Based on this, perform a prioritization of risks so that limited development $$$ maximize cost/benefit.