A Survey of Techniques for Security Architecture Analysis Executive Summary