Now that you have had the opportunity to review various Cyber Attack Scenarios, it is now your turn to create one. As a Group you will identify a Scenario plagued with Cyber Threats. Each team will then be required to create a Threat Model (Logic Diagram) with various options. Selections will result in another option. Below are some examples of possible Threat Modeling activities. https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html Each team will be required to present their Threat Model via Powerpoint and present to the class on Day 3. Each member of the team will be required to submit a copy of their teams powerpoint. Subject : Spring 2020 - Emerging Threats & Countermeas (ITS-834-25) - Full Term Documentation : https://www.cs.montana.edu/courses/csci476/topics/threat_modeling.pdf Example : https://www.helpsystems.com/blog/break-time-6-cybersecurity-games-youll-love 1. Targeted Attack: The Game 2. Cybersecurity Lab 3. Cyber Awareness Challenge 4. Keep Tradition Secure What you need to do: Write one page abstract DO one page PPT Write 2 pages main paper for this two topics( Library users and librarian & User credentials ) Draw a diagram if possible .