Return to Article Details Functional and Non-Functional Requirements of Information Security