Problem
i. How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?
ii. Architecture and design represent one important side of delivering a security posture. That's what this book is all about: How does one go about achieving an architecture and an architectural design that represent the security needs for a system?