explain the security evolution ​