This report discusses cyber security threats and the importance of protecting devices, programs, and networks from unauthorized access. It focuses on the threat of cyber attacks faced by Business and Communication insurance organization and explores the process of threat modeling. Additionally, it explains data flow diagrams and their role in representing the flow of data through a system. The report also highlights different types of cyber threats and factors involved in cyber attacks.