I need a help to complete my assignment.
1.Which of the following do you prefer most for threat modeling a data store and why?
In approximately 300 words.
Use of proper APA formatting and citations is required. If supporting evidence from outside resources is used proper citation is required. Paper should largely consist of your own thoughts and ideas but may be supported by citations and references.
2. Describe a well-known example or personal experience of spoofing (please do not include specific names of organizations or people).