Soft computing techniques applied to corporate and personal security