Chapter 6.2: Technology-Based Security Measures as an Attack Vector and a Weapon