Skip to content
- Draw a data
ow diagram of the complete system, including components internal to the
system as well as all external entities (clients and external services).
- Generate a threat report document. The threat modeling tool creates HTML reports, but
you should run a \Print to PDF” before submitting the report as PDF.
- From the threat report, choose any three security vulnerabilities of dierent types, and
give examples of how they can be exploited.
- For the three vulnerabilities identied above, explain in a few sentences how you would