Basic Requirements For A Secure System