7. Dynamic security assessment: benefits and limitations