Analyzing Computer Security door