• Requirements
  • Threat Analysis
  • File Data Analysis