- Draw a data
ow diagram of the complete system, including components internal to the
system as well as all external entities (clients and external services). - Generate a threat report document. The threat modeling tool creates HTML reports, but
you should run a \Print to PDF” before submitting the report as PDF. - From the threat report, choose any three security vulnerabilities of dierent types, and
give examples of how they can be exploited. - For the three vulnerabilities identied above, explain in a few sentences how you would
address them.