Assume that you operate an Apache-based Linux Web server that hosts your company’s e-commerce site. Assume further that there is a worm known as “Worminator X,” that exploits a (fictional) buffer overflow bug within the Apache Web server package which can result in a remote root compromise. Construct a simple threat model which explains the risk this represents: attacker(s), vulnerability, attack vector, assets, and likelihood of the occurrence, likely impact, and plausible mitigations.