A development team is analyzing a new feature for an online banking application. To identify potential security flaws, they are categorizing threats into the following groups: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Which threat modeling methodology is the team using?
-
A
PASTA
-
B
STRIDE
-
C
DREAD
-
D
CVSS