II General System Security and Service Protection Methods