Watch this video on YouTube
Which technique involves identifying and classifying security errors, defects, and vulnerabilities in software?