550 words on security architecture and design, please find requirement for questions.
Validating That Threats Are Addressed
- Explain the difference between Mitigation Testing and Penetrating Testing (100 words).
- List five major items that should be included in constructing a Software Model.
- Explain the reason Documenting Assumptions are important in threat modeling (100 words).
- Explain how the interplay of Requirements, Threats, and Mitigation all work together (100 words).
- Why is it important to use People/Process/Technology/ as a Frame for requirements (100 words)
- Why are the Seven Laws of Identity important (100 words)?