Respuesta :

Threat intelligence, asset identification, mitigation capabilities, risk assessment, and threat mapping are the five steps in a typical threat modelling process. Each of these offers a unique set of insights and visibility into your security posture.

Threat modeling is typically performed in stages, threat modeling in 4 steps:

Diagram: what are we building?

Identify threats: what can go wrong?

Mitigate: what are we doing to defend against threats?

Validate: validation of previous steps and act upon them

Threat modelling has become the cornerstone of new product design; a product is not considered design complete unless it has a threat model.

To know more about Threat modelling  here

https://brainly.com/question/20316878

#SPJ4