Introduction to security boundaries