Describe the Octave method.Explain: a) Build Asset Based Threat Profile b) Identifying Infrastructure vulnerabilities c) Developing Security Strategy and plans.Describe a case study from your search where octave was used to make decisions. How did those decisions impact the Organizations IT Assets.