Security: Requirements, Vulnerabilities, and Inventory