1 Chapter 4 Overview of Security Types Ayşe Yüce – Ryerson University Copyright © 2012 McGraw-Hill Ryerson.