Previous Lecture Complete and continue  

  3. Overview of security architecture