Problem
Design either a moderate-size (20-25 nodes) attack tree or a couple of smaller attack trees that show a variety of methods - including both electronic and physical - that an attacker might use to breach access to a clinical system console that is connected to an EHR (electronic health record), as to - violate confidentiality, integrity, and/or availability, given a variety of levels of privilege.
(An attack to an external site. is a way of describing the security systems by representing attacks against a particular system or set of systems in a visual way with the ultimate target as the root node and different ways of compromising that node as leaf nodes)