Security breaches in computing cannot be prevented through the use of