Skip to main content

Table 3 Mapping security processes with security personnel

From: Strengthening information technology security through the failure modes and effects analysis approach

Security processes

Internal users

IT professionals

Database administrator

Network administrator

Airport security

Antivirus update

X

x

x

x

x

Firewall

 

x

 

x

 

Password protection

X

  

x

 

Performance and Tuning

 

x

x

x

 

Access control list

  

x

x

 

Internet use policy

X

x

 

x

 

External users

 

x

x

x

x

Internal users

 

x

x

x

x

IT professionals

 

x

x

x

 

CCTV

   

x

x

Biometric

   

x

x

Electronic ID cards

   

x

x

Terminal

X

   

x

Aircraft

X

   

x

Wireless access

   

x

 

Internal operations

X

x

 

x

x

Hardware

 

x

 

x

 

Software

 

x

 

x

 

Data

  

x

x

Â