Chapter 7 Security practices