Threat modeling methods/approaches

Compare and contrast the following threat modeling methods/approaches:

o STRIDE
o PASTA
You should provide an overview of each method (i.e., the major steps that make up each acronym); however, you do not need to provide details of each step. (Hint: you should identify and address the primary underlying difference between them.