Which of the following is a threat modeling methodology used for accessing threats against applications and Operating Systems (OS)?
Basically Available, Soft-State, Eventual-Consistency (BASE)
Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation Of Privilege (STRIDE)
Control Objectives For Information And Related Technology (COBIT)
Security, Trust, Assurance And Risk (STAR)
Submit