A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.
Select the correct option from below
a) Threat Landscaping
b) Threat Modeling
c) Threat Hunting
d) Threat Analysis