op-down security analysis approach
What are the benefits and drawbacks of the top-down security analysis approach?
What are the benefits and drawbacks of the bottom-up security analysis approach?
Give an example of when it would be best to use each of these approaches. Explain why you would choose one particular approach for each example.