HP Tc4400 Reference Guide ProtectTools Security Manager - Page 8

Understanding Security Roles

Page 8 highlights

Introduction Understanding Security Roles In managing computer security (particularly for large organizations), one important practice is to divide responsibilities and rights among various types of administrators and users. ✎ In a small organization or for individual use, these roles may all be held by the same person. For ProtectTools, the security duties and privileges can be divided into the following roles: ■ Security officer-Defines the security level for the company or network and determines the security features to deploy, such as smart cards, biometric readers, or USB tokens. ✎ Many of the features in ProtectTools can be customized by the security officer in cooperation with HP. For more information, visit http://www.hp.com. ■ IT administrator-Applies and manages the security features defined by the security officer. Can also enable and disable some features. For example, if the security officer has decided to deploy smart cards, the IT administrator can enable smart card BIOS security mode. ■ User-Uses the security features. For example, if the security officer and IT administrator have enabled smart cards for the system, the user can set the smart card PIN and use the card for authentication. Reference Guide 1-3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95

Introduction
Reference Guide
1–3
Understanding Security Roles
In managing computer security (particularly for large
organizations), one important practice is to divide responsibilities
and rights among various types of administrators and users.
In a small organization or for individual use, these roles may
all be held by the same person.
For ProtectTools, the security duties and privileges can be
divided into the following roles:
Security officer—Defines the security level for the company
or network and determines the security features to deploy,
such as smart cards, biometric readers, or USB tokens.
Many of the features in ProtectTools can be customized by
the security officer in cooperation with HP. For more
information, visit
.
IT administrator—Applies and manages the security features
defined by the security officer. Can also enable and disable
some features. For example, if the security officer has
decided to deploy smart cards, the IT administrator can
enable smart card BIOS security mode.
User—Uses the security features. For example, if the security
officer and IT administrator have enabled smart cards for the
system, the user can set the smart card PIN and use the card
for authentication.