Analysis of systems should include detecting vulnerabilities by using