asked 80.2k views
5 votes
The first step in Threat Modeling is to


1 Answer

4 votes

Step-by-step explanation:

  1. Decompose the application
answered
User Peppo
by
8.1k points

No related questions found