Chapter 1: Security Principles