8.4 Other Security Considerations