Chapter 1: Understanding Security Fundamentals