6.5 Other Security Considerations