Computer Science, asked by chiragagrawal1087, 2 months ago

which of the following is to be done to avoid limitations in threat models

Answers

Answered by DasRicha
2

Explanation:

1. Don't threat modelling

2. Use strong authentication

3. Account for encryption keys

4. Use appropriate permissions

5. Securing network communications

Hope it helps

Similar questions