This section addresses:
External security systems
Defining security
Overriding security
Conversation-level security