Cyber Exploitation and Mitigation Methodologies

T​‌‍‍‍‌‍‍‌‌‍‌‍‍‌‌‌‍‍‍‍​his is CST 630 Advanced Cyber Exploitation and Mitigation Methodologies (2228) Project 5 Lab report about CREATING A DATA FLOW DIAGRAM USING A THREAT MODELING TOOL. Please write 2 pages of the Lab summary report by answering all 5 Lab questions in the given lab template. The 2 pages exclude the screenshots included. You will need to write a 1-2 paragraph lab introduction about CREATING A DATA FLOW DIAGRAM USING A THREAT MODELING TOOL, answer all 5 questions in the template, and then write a summary in the SUMMARY OF THE LAB EXPERIENCE REPORT section. You will also need to explain all the screenshots in the template for a detailed report. You may also add any additional screenshots as necessary. I will attach ​‌‍‍‍‌‍‍‌‌‍‌‍‍‌‌‌‍‍‍‍​a sample lab report for reference. Additionally, I will provide a username and password to log in to a virtual window to perform the activity, as the questions are based on the lab experience. Please note that the login has a multifactorial authentication, and you have to let me know in advance so that I can provide you with a code that will be generated and sent to my email. I will attach the template as well as the lab instruction/guide. Please create a DATA FLOW DIAGRAM as instructed in the last section of the lab instruction/guide and attach it to the lab report. Here is the link for MARS to log in to the virtual Lab environment. https://mars.umgc.edu/login?ReturnUrl=%2fstudent%2fmy-courses