Computer science

Q1. You are a security analyst at an organization that runs several web applications. Your CIO is in" rel="nofollow">interested in" rel="nofollow">in usin" rel="nofollow">ing threat modelin" rel="nofollow">ing as part of the software development lifecycle. Provide her an overview of threat modelin" rel="nofollow">ing and the value it would provide to your company choose between an asset/risk-based or threat/security-based approach. Q2. Describe an attack tree and what it is used for. Provide an example attack tree on how you would cheat on this Midterm exam. (Do not cheat on this exam or test your attack tree. This is a thought exercise only). [25 poin" rel="nofollow">ints]