Attack tree for breaking into a truecrypt container to get the files
-Inclusion of technical and non technical terms
-Inclusion of software and hardware components
- 30 to 40 nodes needed
- 5 to 8 words in each node
- one side of page with technical terms and another page with non technical terms.