View the step-by-step solution to:

<ThreatModel xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el" xmlns:i="http://www.org/2001/XMLSchema...

My previous assignment is attached which is required for reference for this assignment below:

A security vulnerability report identifies the areas of the organization which are at risk of lost data, outages, etc. Typically, organizations categorize the report to focus on specific areas of the organization and highlight the level of risk per area. Based on the vulnerability report, organizations are able to plan appropriately for budget and resource improvements.

Complete a four to six slide presentation describing the vulnerabilities and associated threats found in your data flow diagram from Week 1.  Include detailed slide notes with at least one supporting reference for each slide note.  No audio required.

Consider people, processes, and technology that can be exploited by the source of a threat.

<ThreatModel  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el" xmlns:i="http://www.w3.org/2001/XMLSchema- instance"><DrawingSurfaceList><DrawingSurfaceModel z:Id="i1"  xmlns:z="http://schemas.microsoft.com/2003/10/Serialization/"><Ge nericTypeId  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el.Abstracts">DRAWINGSURFACE</GenericTypeId><Guid  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el.Abstracts">4af2a213-5d5e-4ade-a7bf- 876421d7fb87</Guid><Properties  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el.Abstracts"  xmlns:a="http://schemas.microsoft.com/2003/10/Serialization/Array s"><a:anyType i:type="b:HeaderDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Diagram</b:DisplayName><b:Name/><b:V alue i:nil="true"/></a:anyType><a:anyType  i:type="b:StringDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Name</b:DisplayName><b:Name/><b:Valu e i:type="c:string"  xmlns:c="http://www.w3.org/2001/XMLSchema">Diagram  1</b:Value></a:anyType></Properties><TypeId  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el.Abstracts">DRAWINGSURFACE</TypeId><Borders  xmlns:a="http://schemas.microsoft.com/2003/10/Serialization/Array s"><a:KeyValueOfguidanyType><a:Key>082d8480-8afa-470b-b1b0- 6f04c8cb2e6e</a:Key><a:Value z:Id="i2"  i:type="StencilRectangle"><GenericTypeId  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el.Abstracts">GE.EI</GenericTypeId><Guid  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el.Abstracts">082d8480-8afa-470b-b1b0- 6f04c8cb2e6e</Guid><Properties  xmlns="http://schemas.datacontract.org/2004/07/ThreatModeling.Mod el.Abstracts"><a:anyType i:type="b:HeaderDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Human  User</b:DisplayName><b:Name/><b:Value  i:nil="true"/></a:anyType><a:anyType  i:type="b:StringDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Name</b:DisplayName><b:Name/><b:Valu e i:type="c:string" 
Background image of page 001
xmlns:c="http://www.w3.org/2001/XMLSchema">Human  User</b:Value></a:anyType><a:anyType  i:type="b:BooleanDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Out Of  Scope</b:DisplayName><b:Name>71f3d9aa-b8ef-4e54-8126- 607a1d903103</b:Name><b:Value i:type="c:boolean"  xmlns:c="http://www.w3.org/2001/XMLSchema">false</b:Value></a:any Type><a:anyType i:type="b:StringDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Reason For Out Of  Scope</b:DisplayName><b:Name>752473b6-52d4-4776-9a24- 202153f7d579</b:Name><b:Value i:type="c:string"  xmlns:c="http://www.w3.org/2001/XMLSchema"/></a:anyType><a:anyTyp e i:type="b:HeaderDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Predefined Static  Attributes</b:DisplayName><b:Name/><b:Value  i:nil="true"/></a:anyType><a:anyType  i:type="b:StaticListDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Type</b:DisplayName><b:Name>type</b: Name><b:Value  i:type="a:ArrayOfstring"><a:string>Human</a:string></b:Value><b:S electedIndex>0</b:SelectedIndex></a:anyType><a:anyType  i:type="b:HeaderDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Configurable  Attributes</b:DisplayName><b:Name/><b:Value  i:nil="true"/></a:anyType><a:anyType  i:type="b:HeaderDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>As Generic External  Interactor</b:DisplayName><b:Name/><b:Value  i:nil="true"/></a:anyType><a:anyType  i:type="b:ListDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Authenticates  Itself</b:DisplayName><b:Name>authenticatesItself</b:Name><b:Valu e i:type="a:ArrayOfstring"><a:string>Not  Applicable</a:string><a:string>No</a:string><a:string>Yes</a:stri ng></b:Value><b:SelectedIndex>0</b:SelectedIndex></a:anyType><a:a nyType i:type="b:ListDisplayAttribute"  xmlns:b="http://schemas.datacontract.org/2004/07/ThreatModeling.K nowledgeBase"><b:DisplayName>Microsoft</b:DisplayName><b:Name>MS<
Background image of page 002
Show entire document
Sign up to view the entire interaction

Top Answer

View the full answer
Walmart Corporation threats and vulnerabilities.pptx

Vulnerabilities and
Associated threats
WALMART CORPORATION
YOUR NAME
COURSE TITLE
INSTRUCTOR NAME
NOVEMBER 07, 2016 Introduction Walmart Corporation is currently in high-level demand of cyber...

Sign up to view the full answer

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

-

Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question
Ask a homework question - tutors are online