The generic security services module could be activated by user activity or alternatively, they might get activated sequentially. The module cryptographic protocols must interact with the underlying security technology which provides the actual implementation of the cryptographic algorithms. The medium module obtains its data from the Filter and differentiate the data stream into several classes. The security policy can be set directly by the user or by a security administrator.