Validation and verification methodology and results

Summary
Approaches for verification and validation will be documented the results of security testing as well as the identified vulnerabilities and their counter measures will be described