Attack Path Analysis - Use Case Demo