Notifications
Clear all
Topic starter
30/10/2022 6:49 am
A security analyst needs to identify possible threats to a complex system a client is developing.
Which of the following methodologies would BEST address this task?
- A . Open Source Security Information Management (OSSIM)
- B . Software Assurance Maturity Model (SAMM)
- C . Open Web Application Security Project (OWASP)
- D . Spoofing, Tampering. Repudiation, Information disclosure. Denial of service, Elevation of privileges (STRIDE)
Suggested Answer: C