please see the fille and follow what is required.
Assignment 5: Create a Threat Model Diagram
The purpose of this assignment is to learn how threat modeling can help to better understand a
security threat/attack.
Requirements:
•
Download, install, and familiarize yourself with the free, open source software tool
called OWASP Threat Dragon. Download here: https://github.com/OWASP/threatdragon/releases/tag/v2.1.1
•
Use the software tool to create a threat model/diagram based on the S.T.R.I.D.E. model
that depicts/describes a SQL Injection threat on a website that asks for a user to login.
•
The general model should depict a user logging in to a web server with a trust boundary
between. The web server should have a data flow to a database.
•
Add at least two S.T.R.I.D.E.-based threats, along with descriptions and mitigations.
•
Save your completed .json file from Threat Dragon and submit.
•
If you are unable to install Threat Dragon, you can use another diagramming tool of your
choice and submit a screenshot of your diagram in a Word document. However, if you
do this, you will need to include your two S.T.R.I.D.E.-based threats (what they are,
where they apply, description, mitigations) in the Word document as well.