PFA Textbook and Document
On page 27 in your textbook, there is a checklist for “Diving in and Threat Modeling”. But before you can do that, you have to fully understand what the checklist is asking you to do. After each checklist item, provide your own definition of what you think the question means.
1. Can we tell a story without changing the diagram?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.
2. Can we tell that story without using words such as “sometimes” or “also?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.
3. Can we look at the diagram and see exactly where the software will make a security decision? Explain what this question means to you? And then provide your answer to the question.
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.
4. Does the diagram show all the trust boundaries, such as where different accounts interact? Do you cover all UIDs, all application roles, and all network interface?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.
5. Does the diagram reflect the current or planned reality of the software?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.
6. Can we see where all the data goes and who uses it?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.
7. Do we see the processes that move data from one data store to another?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more