احتاج متخصص امن سيبراني فاهم ب mtmt & tara
You will need to perform Threat Analysis on your selected system using Microsoft Threat Modeling Tool (MTMT):
Choose a software system you want to analyse. It could be any existing or non-existent software. Your software should not be too simple – it should include at least 10 elements (processes, data stores, and external interactors) and data flows between them.
Write a short description of your selected system.
Draw data flow diagram of your selected system.
Generate threat analysis report of your system.
Save your data-flow diagram (take a screenshot) and threat report.
Create a zip file, which includes your system description, data flow diagram, and threat report and upload it.