3.5 Closing Thoughts on Security