A security team is decomposing an application during a PASTA threat model. What information will they discover during this step of the process?

Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz | 

A security team is decomposing an application during a PASTA threat model. What information will they discover during this step of the process?

  • Which data owners are compromising the organization
  • How the application handles data and which controls are in place
  • The vulnerabilities that have been reported to the CVE® list
  • The types of threats that can be used to compromise data

 

Leave a Comment