Which of the following needs to be taken into account when assessing vulnerability?
A. Risk identification and validation
B. Threat mapping
C. Risk acceptance criteria
D. Safeguard selection
A. Risk identification and validation
B. Threat mapping
C. Risk acceptance criteria
D. Safeguard selection