Lecture 26: security overview