1. True Security: Myth or reality?