Table 7: Threats.

ID Threat

T1 Cache poisoning attacks
T2 Data deletion
T3 SQL injection
T4 VLAN hopping attacks
T5 Earthquake
T6 Data theft
T7 Directory traversal
T8 Data discovery
T9 Physical theft