3 Security features In this chapter: User security features Application security features Data security features