Text this: Applying social network analysis to security