Security Analogies