which of the following is to be done to avoid limitations in threat models
Answers
Answered by
2
Explanation:
1. Don't threat modelling
2. Use strong authentication
3. Account for encryption keys
4. Use appropriate permissions
5. Securing network communications
Hope it helps
Similar questions
English,
1 month ago
Math,
1 month ago
Accountancy,
3 months ago
Math,
9 months ago
English,
9 months ago