80.2k views
5 votes
The first step in Threat Modeling is to


User S Pangborn
by
5.1k points

1 Answer

4 votes

Step-by-step explanation:

  1. Decompose the application
User Peppo
by
5.1k points