Problem
Identify a software or hardware that you use often. First describe the function of this software/hardware. Then discuss the security principles are applied when designing and implementing this system. Make sure to pick from the ten principles introduced and justify your reason by details.