Problem
Create your own threat tree on the Acme Database DFD on spoofing the data flow on. Discuss your tree and the rational used to create it.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.