Quantifying Vulnerabilities in an Airport Checkpoint