Priority: High;
Estimated person-hours: 5
Volunteer(s)/Candidate(s): None
Needs to cover topics such as access control, access monitoring, nefarious code injection, and other relevant security issues.
Relates to #10, copied from here with minimal editing for quality.