Avoiding the Security Black Hole with Non-Functional Requirements