11.4 Other Security Considerations