Description:

Dan Billing and Kate Paulk draw comparisons between casing a house and building a threat model; in their activity, they use a security model to identify security weaknesses in a house and then work out the software equivelants