Professional Documents
Culture Documents
MAUNDA Assignment2.1 IT41S2
MAUNDA Assignment2.1 IT41S2
Score
Group No.: 5
Name:
ALBERTO, AARIC BRYAN
ATENDIDO, REJ RYAN
CHAN, JOHN CARLO
ESPINA, JOHN CARLOS
GOMEZ, FRANCIS EDISON
MATA, EDWARDINE
MAUNDA, BENJAMIN
SURBAN JR., DANTE
TIRONA, JOHN MATTHEW
IT41S2
Engr. Junnel E Avestro
Professor
IT024 – Cyber Threat Modeling
3.1.6. Reviewers:
CISCO
· Server Type
Apache
4. Group Observation
Our goal in the cybersecurity industry, as IT students who will shortly continue on to become IT
professionals, is to safeguard against hackers and security breaches in the customers' and businesses' we
work for. Additionally, we provide security education to the rest of the staff. help disseminate information
and raise awareness of several current cybersecurity incidents. In the area of cybersecurity, we have talked
extensively about a variety of special issues.
5. Individual Synthesis
ALBERTO, AARIC BRYAN
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
We were starting to develop a threat model for our business during this exercise, and all the
participants, reviewers, and external dependencies were noted down and discussed. We have explored
many methods for doing the threat modelling process while developing this activity, and for the time being,
we have opted to use CISCO as our reviewers.
MATA, EDWARDINE
In this exercise, we provided the name of our company and a brief description that would be
utilized in the final project for our Cyber Threat Modeling course. We suggested developing an e-commerce
website application that would provide our customers with affordable technology. To secure the data of the
organization, we needed to build up a system with security precautions.
MAUNDA, BENJAMIN
In this activity, we discussed and gave details and model about the project,each of participant has
significant role in this project, the programmer who will be write the program, the pen tester that will test the
program and the maintenance checker, ,Cybersecurity is the process of defending systems and networks
against harmful intrusions. Cybersecurity is crucial since it guards against theft and destruction of many
types of data.
“We affirm that we have not given or received any unauthorized help on this discussion and that
this work is our own.
ALBERTO, AARIC BRYAN ATENDIDO, REJ RYAN CHAN, JOHN CARLO
6. Reference: