Consider you operate an Apache-based Linux Web server which hosts your company’s e-commerce site. Assume further that there is a worm known as “Worminator X,” that exploits a (fictional) buffer overflow bug within the Apache Web server package that can result in the remote root compromise. Construct a simple threat model which explains the risk this represents: attacker(s), vulnerability, assets, attack vector, and the likelihood of occurrence, likely impact, and the plausible mitigations.