Managing Cybersecurity Risk Using Threat Based Methodology for Evaluation of Cybersecurity Architectures Conference Paper uri icon