Question: Threat Modeling The student will develop a threat report that outlines the threats against a system using the threat modeling approach. The system under analysis
Threat Modeling The student will develop a threat report that outlines the threats against a system using the threat modeling approach. The system under analysis is at the students discretion. The report must identify the system that will be analyzed and present the results of the threat modeling process.
The report will consist of 8 sections, an introduction, one section for each step in the threat modeling process, and a conclusion (or summary). The section count does not include front or back matter.
A sample outline is shown below.
Cover Page
Abstract
Table of Contents
Introduction
1. Asset Identification
2. Application Architecture
3. Application Decomposition
4. Threats
5. Documented Threats
6. Threat Ranking
Conclusion
References
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
