Misuse Case

Produced Threat

M-2.1: Compromise Router

Attacker hacks the system in search of login information

M-2.2: Guess Logon Info

Attacker uses this information to login to the system as a valid user

M-2.3: View Payroll Information

Attacker view information in the system