Analysis Techniques For Information Security