Analysis Techniques for Information Security