To protect the data in the machine, configure the machine so that login and logout are performed
properly.
User authentication cannot prevent unauthorized use completely. For example, an unauthorized
person can log in to the machine by guessing the password. If a user does not log out of the
machine, another user can use the privileges of the previous user.
Specify the following functions to protect the machine against such risks.