Part II. Design of security