Which of the following BEST represents privacy threat modeling methodology?
Which of the following BEST represents privacy threat modeling methodology?
A . Mitigating inherent risks and threats associated with privacy control weaknesses
B . Systematically eliciting and mitigating privacy threats in a software architecture
C . Reliably estimating a threat actor’s ability to exploit privacy vulnerabilities
D . Replicating privacy scenarios that reflect representative software usage
Answer: B
Explanation:
Privacy threat modeling is a methodology for identifying and mitigating privacy threats in a software architecture. It helps to ensure that privacy is considered in the design and development of software systems, and that privacy risks are minimized or eliminated. Privacy threat modeling typically involves the following steps: defining the scope and context of the system, identifying the data flows and data elements, identifying the privacy threats and their sources, assessing the impact and likelihood of the threats, and applying appropriate countermeasures to mitigate the threats.
Reference: CDPSE Review Manual (Digital Version), page 97
Latest CDPSE Dumps Valid Version with 120 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund