Analysing Security Requirements of Information Systems Using Tropos