8-3 - How to Secure Systems Against Attacks