4.8.2 What You Can Secure