Select an attack, such as "Break into instructor's lab computer" or "Steal credit card number from online user," and then develop an attack tree for it. The tree should have at least four levels with three boxes on each level
Resource:
https://en.wikipedia.org/wiki/Attack_tree
https://www.amenaza.com/AT-whatAre.php