System security requirements, risk and threat analysis – 2nd iteration

Summary
Based on the pilot definition in T6.1 and the elaborate vulnerability catalogue and this report contains an updated version of the security analysis from D2.2.