This document presents a model for identifying security requirements of a system during the requirements analysis phase. The model uses use case diagrams along with security questionnaires tables. A use case diagram depicts the functional requirements and interactions between actors and the system. The proposed model adds a security questionnaires table for each use case/process in the diagram to identify related security requirements. The document implements the model on a point of sale system case study, presenting sample security questionnaires tables for the login, add product, and view product processes. The tables contain security-related questions to address during requirements. The model aims to incorporate security early in development to avoid later issues.