Q&A: Designing Network Security