IT security analysis