A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.
A)Threat Modeling
B)Threat Landscaping
C)Threat Analysis
D)Threat Hunting