Chapter 5: Applying Cybersecurity