550 words on security architecture and design, please find requirement for questions.

Validating That Threats Are Addressed

  1. Explain the difference between Mitigation Testing and Penetrating Testing (100 words).
  2. List five major items that should be included in constructing a Software Model.
  3. Explain the reason Documenting Assumptions are important in threat modeling (100 words).
  4. Explain how the interplay of Requirements, Threats, and Mitigation all work together (100 words).
  5. Why is it important to use People/Process/Technology/ as a Frame for requirements (100 words)
  6. Why are the Seven Laws of Identity important (100 words)?