The end-user interacts with the security system through the following functions:


    1. System Access (Log In)
    2. Disconnecting from the system (LogOut)
    3. Changing the password (on request or upon expiry)
    4. Configuring Users