Which of the following is a methodology for threat modeling in application?
Disaster, Reproducibility, Exploitability, Affected Users, And Discoverability (DREAD)
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE)
Pretend, Allow, Crash, Modify, Ascertain, Name
Confidentiality, Authentication, Integrity, Nonrepudiation, Availability
Submit