cellular security Summary