Research Article
An Efficient Identification of Security Threats in Requirement Engineering Methodology
Figure 4
Comparing the SQUARE and ISTDRE technique using DREAD risk value. Note: In the above graph, 100 shows that the threat is eliminated completely, and 0 means the threat is not eliminated. Threats are arranged in a decreasing order of DREAD risk value.