Security management Run-time operations The end-user interacts with the security system through the following functions: System Access (Log In) Disconnecting from the system (LogOut) Changing the password (on request or upon expiry) Configuring Users