Test case | Number of tests | Frequency | Success | Solution efficiency (%) |
Attacker login to Web application using username/password and forging facial image through web cam | 25 | 30 minutes | No | 100% |
Attacker login directly to Database application using database username/password and a primary key for decryption | 25 | 30 minutes | No | 100% |