- Divide security analysis into multiple segments - List models that can be used for analysis or approach - Brief about vulnerabilities