Toward Establishing A Catalog Of Security Architecture Weaknesses