sample:
(write a short paragraph)… the please see the sample attack tree
My attack goal is to find means to gain access to an email account from an employee of a company. With access to an employee’s email, the unauthorized person may be able to find confidential, personal, and critical business information. In addition, the email access can be used as a vector to phish for data from other employees or customers. Possible bad actors can be competitors of the company and individuals (employees, former employees, random person)