Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz |
A security team is decomposing an application during a PASTA threat model. What information will they discover during this step of the process?
- Which data owners are compromising the organization
- How the application handles data and which controls are in place
- The vulnerabilities that have been reported to the CVE® list
- The types of threats that can be used to compromise data