Security processes | Internal users | IT professionals | Database administrator | Network administrator | Airport security |
---|---|---|---|---|---|
Antivirus update | X | x | x | x | x |
Firewall | Â | x | Â | x | Â |
Password protection | X | Â | Â | x | Â |
Performance and Tuning | Â | x | x | x | Â |
Access control list | Â | Â | x | x | Â |
Internet use policy | X | x | Â | x | Â |
External users | Â | x | x | x | x |
Internal users | Â | x | x | x | x |
IT professionals | Â | x | x | x | Â |
CCTV | Â | Â | Â | x | x |
Biometric | Â | Â | Â | x | x |
Electronic ID cards | Â | Â | Â | x | x |
Terminal | X | Â | Â | Â | x |
Aircraft | X | Â | Â | Â | x |
Wireless access | Â | Â | Â | x | Â |
Internal operations | X | x | Â | x | x |
Hardware | Â | x | Â | x | Â |
Software | Â | x | Â | x | Â |
Data | Â | Â | x | x | Â |