Information Security;Please refer to the case which is attach and requirement will find it at the end . It required a proposal of two pages including the following :- Analyse the problem and identify (users/roles/actors) Identify primary use cases – Ident

Please refer to the case which is attach and requirement will find it at the end . It required a proposal of two pages including the following :- Analyse the problem and identify (users/roles/actors) Identify primary use cases – Identify assets, Vulnerabilities and threats Please see the rest of requirement in the case