Watch this video on YouTube
Which of the following is the MOST effective method for assessing and mitigating vulnerabilities of security architecture?