Chapter 6.1: Technology-Based Security Measures as an Attack Vector and a Weapon