Application, Data, and Host Security Scenarios