Analyzing Computer Security by