Threat Modeling

(From Dana Epps’ Blog)

My only quibble with this diagram is how the boxes are arranged. Other than that, this is a nice visual way to demonstrate the nature of our business:

I guess I should source this back through Dan Sellers of Microsoft and, in particular, the Common Criteria:  Common Criteria for Information Technology Security Evaluation v2.1