Security

A secure system is resistant to unauthorised access. In particular, only system administrators should have access to system configuration files and services, and users should not have access to other users' data. The responsibility for security falls on both the application and the configuration of the system it is run on.

Below is a list of factors to consider in ensuring the system is secure. More details about each of these factors can be found through general research, so each factor describes only the steps taken for the application's system.

TODO: Clean up factors.