Security processes | Failure modes | ||
---|---|---|---|
Confidentiality | Availability | Integrity | |
Antivirus update | Â | Â | x |
Firewall | Â | x | Â |
Password protection | x | Â | Â |
Performance and tuning | Â | Â | x |
Access control list | x | x | Â |
Internet use policy | x | Â | x |
External users | x | Â | x |
Internal users | x | Â | x |
IT professionals | Â | Â | x |
CCTV | x | Â | Â |
Biometric | x | Â | Â |
Electronic ID cards | x | Â | Â |
Terminal | Â | x | Â |
Aircraft | Â | Â | x |
Wireless access | Â | x | x |
Internal operations | Â | Â | x |
Hardware | x | x | x |
Software | x | x | x |
Data | x | x | x |