How Is the Injective Protocol (INJ) Network Secured?

How Is the Injective Protocol (INJ) Network Secured?