3.4 The advantages and disadvantages of security by design