Answer:
Information processing model
<em>Hope it helps!</em>
Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.
s
Explanation:
i think the answer is a