Cyber Security

  1. Draw a data
    ow diagram of the complete system, including components internal to the
    system as well as all external entities (clients and external services).
  2. Generate a threat report document. The threat modeling tool creates HTML reports, but
    you should run a \Print to PDF” before submitting the report as PDF.
  3. From the threat report, choose any three security vulnerabilities of di erent types, and
    give examples of how they can be exploited.
  4. For the three vulnerabilities identi ed above, explain in a few sentences how you would
    address them.