In your own words, discuss one attack library and how it is used.

Respond to at least 2 other learners.

  • attachment

    Threat_Modeling_16wk_session_4a1.pdf