in Ethical Hacking by
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.

Threat Modeling

Threat Landscaping

Threat Analysis

Threat Hunting

▼ Show 1 Answer

0 votes
Threat Modeling
Learn More with Madanswer

Related questions

0 votes
asked Mar 17 in Threat Modeling by sharadyadav1986