This document implies : - a list of vulnerabilities due to IN architecture to the use of SCF-SDF and SCF-SCF interfaces - a desecription of threats (intentioanl or accidental) and their effect - a determination of their likelihood based on the motivation of the attacker - a list of requirements which cover the main scenarii