Two Threat Analysis Techniques Compared