Question: This is my experiment in software security. Please quickly try to carry out this experiment and write the rsult according to the order of the


This is my experiment in software security. Please quickly try to carry out this experiment and write the rsult according to the order of the report template, thanks.
RPOJECT 02: THREAT MODELING FOR AN E-COMMERCE SYSTEM USING THREAT MODELING 2016. Now, you or your team will construct a system to implement an E-COMMERCE platform. The system will have features as below: 1) Run basing on Internet(B/S architecture). 2) Used by as many as possible. 3) Maintain function for administrators. 4) Web users from many places. 5) Paying System connected with some banks. 6) Goods managing and showing system. 7) User managing system. 8) Etc. (You can give the requirement specification as Taobao.com) To finish below tasks please: 1) Description about users. 2) Description about architecture. 3) UML use case diagrams. 4) Description about Security Requirements. 5) Data Flow Diagrams. 6) Threat modeling 7) Threats analysis report. 1. Name of experiment: 2. Experimental hours: 4 3. Experimental content and purpose: 4. Experimental principle: 6. Experimental steps: 7. Analysis of experimental data and results: (Fill in code, data or screenshots in order of experimental steps) 8. Experimental conclusion, experience and suggestions for improvementStep by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
