Security principles Vectors

- Page 4