+2 votes
in Cybersecurity Prologue by
recategorized by
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.

Select the correct option from below

a) Threat Landscaping

b) Threat Modeling

c) Threat Hunting

d) Threat Analysis

1 Answer

0 votes
by
edited by
Threat Modeling

A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called Threat Modeling

Related questions

+2 votes
asked Jan 28, 2020 in Cybersecurity Prologue by AdilsonLima
+2 votes
asked Jan 28, 2020 in Cybersecurity Prologue by AdilsonLima
...