Introducing critical security methods