How Is the Fantom (FTM) Network Secured?

How Is the Fantom (FTM) Network Secured?