
Ultimate access to all questions.
Evaluating threats to business-critical applications by using threat modeling involves identifying potential threats and assessing their impact. Describe the steps you would take to conduct this evaluation. How would you ensure that the threat modeling process is comprehensive and addresses both internal and external threats?
A
Use STRIDE methodology and involve all stakeholders
B
Conduct a SWOT analysis and use automated tools
C
Focus on external threats only and use a risk matrix
D
Review past security incidents and apply lessons learned