Question: This is my experiment in software security. Please quickly try to carry out this experiment and write the rsult according to the order of the

This is my experiment in software security.

This is my experiment in software security.

This is my experiment in software security. Please quickly try to carry out this experiment and write the rsult according to the order of the report template, thanks.

RPOJECT 02: THREAT MODELING FOR AN E-COMMERCE SYSTEM USING THREAT MODELING 2016. Now, you or your team will construct a system to implement an E-COMMERCE platform. The system will have features as below: 1) Run basing on Internet(B/S architecture). 2) Used by as many as possible. 3) Maintain function for administrators. 4) Web users from many places. 5) Paying System connected with some banks. 6) Goods managing and showing system. 7) User managing system. 8) Etc. (You can give the requirement specification as Taobao.com) To finish below tasks please: 1) Description about users. 2) Description about architecture. 3) UML use case diagrams. 4) Description about Security Requirements. 5) Data Flow Diagrams. 6) Threat modeling 7) Threats analysis report. 1. Name of experiment: 2. Experimental hours: 4 3. Experimental content and purpose: 4. Experimental principle: 6. Experimental steps: 7. Analysis of experimental data and results: (Fill in code, data or screenshots in order of experimental steps) 8. Experimental conclusion, experience and suggestions for improvement

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!