SlideShare a Scribd company logo
1.
Identify all the DFD (data flow diagram) elements
(Shostack, 2014, p.531.).
2.
Identify all threat types to each element(Shostack, 2014,
p.531.).
3.
Identify threats (three or more), one each for data flow, data
store and process(Shostack, 2014,p.531).
4.
Identify first-order mitigations for each threat
(Shostack, 2014, p.531.).

More Related Content

DOCX
Discuss how a successful organization should have the followin.docx
DOCX
Discuss how portrayals of violence in different media may affect hum.docx
DOCX
Discuss how culture affects health physical and psychological healt.docx
DOCX
Discuss how business use Access Control to protect their informa.docx
DOCX
Discuss how or if post-Civil War America was truly a period of r.docx
DOCX
Discuss how partnerships are created through team development..docx
DOCX
discuss how health and illness beliefs can influence the assessment .docx
DOCX
Discuss how geopolitical and phenomenological place influence the .docx
Discuss how a successful organization should have the followin.docx
Discuss how portrayals of violence in different media may affect hum.docx
Discuss how culture affects health physical and psychological healt.docx
Discuss how business use Access Control to protect their informa.docx
Discuss how or if post-Civil War America was truly a period of r.docx
Discuss how partnerships are created through team development..docx
discuss how health and illness beliefs can influence the assessment .docx
Discuss how geopolitical and phenomenological place influence the .docx

More from salmonpybus (20)

DOCX
Discuss how each of these factors (inflation, changing population de.docx
DOCX
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
DOCX
Discuss how business use Access Control to protect their information.docx
DOCX
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
DOCX
Discuss how and why companies use cryptography.Length, 2 pages..docx
DOCX
Discuss how an object must be an expert on certain sets of informati.docx
DOCX
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
DOCX
Discuss how Biblical worldview provides guidance to the Christian he.docx
DOCX
Discuss how an IPSIDS can protect user information on a Windows sys.docx
DOCX
discuss how a particular human-computer interface might impact a per.docx
DOCX
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
DOCX
Discuss emerging trends in the use of Internet currency such as Bitc.docx
DOCX
Discuss Edward Saids concept of Orientalism and its relationship .docx
DOCX
Discuss educational plans for preventing the spread of COVID-1.docx
DOCX
Discuss e-commerce its development and future perspectives. Sourc.docx
DOCX
Discuss different encryption methods that are specific to Microsoft .docx
DOCX
Discuss critical infrastructure and key resources (CIKR). What are t.docx
DOCX
Discuss differences in research findings regarding sentences imposed.docx
DOCX
Discuss cultural disparity in health care for the Hispanic commu.docx
DOCX
Discuss consensus-building activities you have been involved with .docx
Discuss how each of these factors (inflation, changing population de.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss how business use Access Control to protect their information.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docx
discuss how a particular human-computer interface might impact a per.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss Edward Saids concept of Orientalism and its relationship .docx
Discuss educational plans for preventing the spread of COVID-1.docx
Discuss e-commerce its development and future perspectives. Sourc.docx
Discuss different encryption methods that are specific to Microsoft .docx
Discuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss differences in research findings regarding sentences imposed.docx
Discuss cultural disparity in health care for the Hispanic commu.docx
Discuss consensus-building activities you have been involved with .docx

Recently uploaded (6)

PPTX
Slide Ibadah siang 29 mei 2025 jika .pptx
PDF
ಶ್ರೀ ಕ್ಷೇತ್ರ ಚಂಪಕಧಾಮ ಸ್ವಾಮಿ ದೇವಾಲಯSri Kshetra Champakadham Swamy Temple
PDF
"ಶ್ರೀ ಕ್ಷೇತ್ರ ಚಂಪಕಧಾಮ ಸ್ವಾಮಿ ದೇವಾಲಯ""Sri Kshetra Champakadham Swamy Temple"
PDF
فێرکردن و فێربوونی مۆدێرن.pdf دەروازەیەک بۆ
PPTX
PETA.pptx,a,amamamamamamamamamammamamamam
PPTX
Coklat Beige Ilustrasi 3 Dimensi Tugas Kelompok Presentasi.pptx
Slide Ibadah siang 29 mei 2025 jika .pptx
ಶ್ರೀ ಕ್ಷೇತ್ರ ಚಂಪಕಧಾಮ ಸ್ವಾಮಿ ದೇವಾಲಯSri Kshetra Champakadham Swamy Temple
"ಶ್ರೀ ಕ್ಷೇತ್ರ ಚಂಪಕಧಾಮ ಸ್ವಾಮಿ ದೇವಾಲಯ""Sri Kshetra Champakadham Swamy Temple"
فێرکردن و فێربوونی مۆدێرن.pdf دەروازەیەک بۆ
PETA.pptx,a,amamamamamamamamamammamamamam
Coklat Beige Ilustrasi 3 Dimensi Tugas Kelompok Presentasi.pptx

1. Identify all the DFD (data flow diagram) elements(Shostack,

  • 1. 1. Identify all the DFD (data flow diagram) elements (Shostack, 2014, p.531.). 2. Identify all threat types to each element(Shostack, 2014, p.531.). 3. Identify threats (three or more), one each for data flow, data store and process(Shostack, 2014,p.531). 4. Identify first-order mitigations for each threat (Shostack, 2014, p.531.).