How to Prove Security Effectiveness