Tutorial: The Security of Data in Networks