Threat Model
Step 1: The architecture was discussed but including a diagram would have made an improvement. The diagrams on pages 6 and 7 are not the mobile application architecture.
Step 2: the requirements were adequately addressed.
Step 3: threats and threat agents were partially discussed. Examples of human interaction threat agents include, app store approvers, internal employees, malicious developers, the owner of the device, a stolen device user or a common Wi-Fi network user. Malware on the device, malicious apps, malicious sms and scripts that execute at the browser are all examples of automated programs threat agents.
Step 4: methods of attack were not addressed.
Step 5: The Excel spreadsheet was completed correctly.
Step 6: the controls were not adequately addressed.
Writing is accurate in diction, spelling, and punctuation except for the errors indicated on the attached document.
You cited creditable reference sources according to APA format.