to identify the security requirements with the help of misuse cases.
To enable the students to identify user stories and sub stories for a given case.