Question: 1. Identify all the DFD (data flow diagram) elements (Shostack, 2014, p.531.).
2. Identify all threat types to each element(Shostack, 2014, p.531.).
3. Identify threats (three or more), one each for data flow, data store and process(Shostack, 2014,p.531).
4. Identify first-order mitigations for each threat (Shostack, 2014, p.531.).