Chapter 15 covers Cybersecurity Engineering. Within the chapter the misuse-case Leave a reply Chapter 15 covers Cybersecurity Engineering. Within the chapter the misuse-case diagram depicts how an attacker might misuse a system. Create a misuse-case diagram (your own not one copied from another source) for one of the types of attacks discussed (see attached). Provide misuse-case diagram and explanation of the attack. References should be included for internal and external resources. Standard use of APA format is required with website URL included. One slide for diagram and one slide for explanation. This entry was posted in Computer Science on December 4, 2021 by .