The Rationalization of Security in Computing