This chapter provides basic information on how
to use the system securely. If you apply this knowledge consistently
and accurately, while observing your site's specific security
policies, you can make the difference between a secure system and
one that is vulnerable to unauthorized users.