Table 6: Threat analysis of the proposed system