
Ultimate access to all questions.
You are designing a threat modeling exercise for a business-critical application that processes sensitive financial data. Describe the steps you would take to identify potential threats, assess their impact, and prioritize them based on risk. How would you ensure that the threat modeling process is comprehensive and addresses both internal and external threats?
A
Use STRIDE methodology and involve all stakeholders
B
Conduct a SWOT analysis and use automated tools
C
Focus on external threats only and use a risk matrix
D
Review past security incidents and apply lessons learned