Follow APA guidelines.
1. Relative to STRIDE, which aspect (i.e. Spoofing, Tampering, Repudiation, etc) can be effectively addressed using the “wait and see” approach and yet still not expose a system to more risk.2. Make an argument for or against custom threat mitigation approaches versus standard threat mitigation approaches.