Scoping Strategies for Security