Analyzing Security Threats