Using Security Equivalents