3.2 Explore the principles of security by design