How Is the The Graph (GRT) Network Secured?

How Is the The Graph (GRT) Network Secured?