Chapter 5. Security issues