Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Please see the attachements for textbook and assignment format where you need to complete it by reading the text book for Thread modelling .On page 27 in your textbook, there is a checklist for “Di
Please see the attachements for textbook and assignment format where you need to complete it by reading the text book for Thread modelling .
On page 27 in your textbook, there is a checklist for “Diving in and Threat Modeling”. But before you can do that, you have to fully understand what the checklist is asking you to do. After each checklist item, provide your own definition of what you think the question means.
Please go through the assignment document attached and fill the answers accordingly .
1. Can we tell a story without changing the diagram?2. Can we tell that story without using words such as “sometimes” or “also”?3. Can we look at the diagram and see exactly where the software will makea security decision?4. Does the diagram show all the trust boundaries, such as where differentaccounts interact? Do you cover all UIDs, all application roles, and allnetwork interfaces?5. Does the diagram refl ect the current or planned reality of the software?
6. Can we see where all the data goes and who uses it?7. Do we see the processes that move data from one data store to another?