which of the following is to be done to avoid limitations in threat models
Answers
Answered by
2
Explanation:
1. Don't threat modelling
2. Use strong authentication
3. Account for encryption keys
4. Use appropriate permissions
5. Securing network communications
Hope it helps
Similar questions