For the scenario we have added the vulnerability concept and the concept of an exploit. While assets may have vulnerabilities, only once there is a way to exploit it those vulnerabilities have significance. To test how said model could be used in a real life scenario we collected data from the information security mailing list “Bugtraq" and modeled a web server as the asset of interest. By selecting a random version, in our case version 2.2.12, we got access to a list of known (and reported) vulnerabilities assigned to this version of this particular web server software. Additionally we added the listed exploit along with a general class of threats to the modeled scenario. All information is available from the Bugtraq report. Figure 3 shows the instantiated concepts as UML classes.