80.2k views
5 votes
The first step in Threat Modeling is to


User S Pangborn
by
7.2k points

1 Answer

4 votes

Step-by-step explanation:

  1. Decompose the application
User Peppo
by
7.1k points