0 votes
in Data Handling by
The first step in analyzing the attack surface is ________.

Creating a threat model

Information gathering

Understanding the context

Identifying all input to the code

Related questions

+1 vote
asked Feb 15, 2020 in JAVA by rahuljain1
+1 vote
asked Nov 2, 2020 in Data Handling by AdilsonLima
...