0 votes
in Data Handling by
The first step in analyzing the attack surface is ________.

Creating a threat model

Information gathering

Understanding the context

Identifying all input to the code
...