Secure scanning: Brother security fundamentals (Part 4 of 12)