3 Security features In this chapter User security features Application security features Data security features