An organization has recently suffered a series of security breaches that have significantly damaged its reputation. Several successful attacks have resulted in compromised customer database files accessible via one of the company's web servers. Additionally, an employee had access to secret data from previous job assignments. This employee made copies of the data and sold it to competitors. The organization has hired a security consultant to help them reduce their risk from future attacks.
What would the consultant use to identify potential attackers?
A. Asset valuation
B. Threat modeling
C. Vulnerability analysis
D. Access review and audit

Respuesta :

Answer:

B.

Explanation:

Threat Modeling is the process of identifying and optimizing network security. This practice helps to find the possible threats to confidential information.

Threat Modeling is used to protect the systems. In this practice, the consultant identifies the enterprise's assets and analyze the work of all applications. Then it sets the security profile on all applications and documenting adverse effects of it.

In the given scenario, the consultant will use the tool or technique of threat modeling to identify the potential attackers.

So, the correct answer is option B.