You are commenting 1. Arming the security system The user activates the system — using a key fob