The [security analysis of Multics] was to be carried out on … a goal of one vulnerability per security control … [hardware, software, procedures] was set … An attempt was to be made to operate … each penetration, an attempt would be made to … exploitations were successfully investigated. These included changing access … and accessing the system password file. … [p. 144, the total cost was approximately 257 manhours].
Google-1
Google-2
Copyright clearance needed for quotation.