Secure Design Principles vs. Threat Modeling