This document discusses security requirements and misuse cases. It begins by defining misuse cases as a way to specify unwanted system behaviors and security threats. It then provides an overview of how misuse cases relate to and differ from typical use cases. The document explains how misuse cases can help identify security risks and requirements. It provides examples of misuse cases and discusses strengths such as improving communication about security requirements.