A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source.
Identify the step in which different threat sources are defined:
A . Identification Vulnerabilities
B . Control analysis
C . Threat identification
D . System characterization
Answer: C