What testing technique enables the designer to develop mitigation strategies for potential vulnerabilities?
A. Manual inspections and reviews
B. Penetration testing
C. Threat modeling
D. Source code review
A. Manual inspections and reviews
B. Penetration testing
C. Threat modeling
D. Source code review