Section 4: Securing Hadoop