security threat model executive protection security computer security access control network security bodyguard buffer overflow computer internet security security program manager cctv firewall investigations smart card module software vulnerabilities exploit smart card deployment software security alarm antivirus