0 votes
in Internet of Things IoT by
The process of designing a security specification and then eventually testing that specification is known as __________.

Threat intelligence

Threat modeling

Threat mitigation

Threat hunting

1 Answer

0 votes
by

Threat modeling

Related questions

0 votes
asked Apr 3, 2020 in Secure Code Review by rajeshsharma
0 votes
asked May 1, 2020 in Internet of Things IoT by SakshiSharma
...