Assignment
1) Explain how to threat model software you acquire.
2) Explain how to threat model software you build.
3) List two specific non-threat-modeling-driven tests you can perform.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.