This section is derived from good practice guide of security.