Advance security & information system

Posted: May 14th, 2021

Lab: Threat Modeling
Using the the Microsoft Threat Modeling tool “model” the web service that takes an user input from the internet and gets a response from query of a database as shown in the picture below.

For all communication modify the link properties to be encrypted. For data stored at individual components have the data be encrypted. Generate:
1. A threat report keeping the state as Not Started.
2. Go to each individual threat and change the states to either “Mitigated”, “Not Applicable”, “Need Investigation”. Change the priority as deemed for each threat and provide justification.
3. Regenerate a threat report after working on all the threats.
What to Submit?
Submit a zip file that contains the following:
1. Write-up in Microsoft Word about the Lab goals and insights
2. Threat report from “Microsoft Threat Modeling tool” where threats are just generated by the tool (threats are in a Not Started state)
2. Threat report  from “Microsoft Threat Modeling tool” with threats having different states other than “Not Started” state, with adjusted priority and justification

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
Open chat
You can contact our live agent via WhatsApp! Via + 1 3234125597

Feel free to ask questions, clarifications, or discounts available when placing an order.