Misuse Case | Produced Threat |
M-2.1: Compromise Router | Attacker hacks the system in search of login information |
M-2.2: Guess Logon Info | Attacker uses this information to login to the system as a valid user |
M-2.3: View Payroll Information | Attacker view information in the system |