network security, security chain, login procedure, crowdsourced security