Hierarchical relation of operational mission to underlying functions, devices, and software vulnerabilities