Designing Networks for Security 2