Watch this video on YouTube
A wealth of information that is associated with threat modeling and attack surface minimization design is captured in the system via which process?