Information security, Virtual tools, physical tools, logical security