How To Do Threat Modeling?

Download Microsoft Threat modeling .
Then write to explain why do we need the Microsoft Threat modeling, how to use it
Give a complete example (2 application as distributed below)  ; your end results are the list and description  of risk found . Your report must conations the following items:
Why Do Threat Modeling?
When To Do Threat Modeling?
How To Do Threat Modeling?
How To Do Threat Modeling
Threat Modeling Scope?
Your report should be 20 Page (single space Font 12 Times New Roman)
Application1:Threat modeling for web service
Application2: Threat modeling Domain Name System-Based Electronic Mail Security SP 1800-6
Note: need to download   ThreatModelingTool2016.msi
For downloading pls go to this link:
2.How To Use Microsoft Threat Modeling Tool 2016
For using microsoft tool

recognize the chosen designer characteristics in the various price point categories especially lower ones as they are inspired by designers.

I need my part c for my term project done by end of day friday  at 11:59. I’ve attached parts a and b NOTE you must read them to understand….

 provide a comprehensive analysis of the similarities and differences in the representation of the human form in these early depictions. 

All early civilizations – prehistoric, Near East, Egyptian, Aegean, and Roman – attempted to represent the human figure within their art. Within this essay, provide a comprehensive analysis of the similarities and differences in the representation….

focus on the theoretical and philosophical questions at issue, yet always trying to relate the chosen topic to some specific architectural example, whether built or unbuilt.

It is a history of architecture class. But the paper is a research paper that should be focusing more on architectural theory and philosophy themes and then relate the themes….