Chapter 9. Identify Targets and Roles
Chapter 10. Analyze Attacks and Vulnerabilities
Chapter 11. Analyze Mitigations and Protections
Chapter 12. Define and Design