Computer Science, asked by TanushkaRathore7750, 7 months ago

A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called _________

Answers

Answered by MrSudipTO
1

Answer:

Explanation:

A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called _________

Your answer

Threat Modeling

Answered by jimmyrcj
0

Answer:

Threat Modeling

Explanation:

tcs quiz

Similar questions