Notifications
Clear all
Topic starter
A security analyst needs to identify possible threats to a complex system a client is developing .
Which of the following methodologies would BEST address this task?
- A . Open Source Security Information Management (OSSIM)
B. Software Assurance Maturity Model (SAMM)
C. Open Web Application Security Project (OWASP)
D. Spoofing, Tampering. Repudiation, Information disclosure. Denial of service, Elevation of privileges (STRIDE)
Suggested Answer: C
Posted : 11/02/2023 12:13 pm