Having appropriate access to hardware and software, and getting the security access required to perform tasks can be considered which of the following?