Name the techniques discussed in class to address developing security-sensitive software.
A) Risk assessment, incident response, and encryption
B) Secure coding, threat modeling, and code reviews
C) Physical security, intrusion detection, and penetration testing
D) User training, access controls, and network segmentation