What is access control? How do cyber operators like you manage their users’ access to company resources? Sharing what you know will help solidify your knowledge and introduce you to other perspectives.

  • In your own words, write 1–2 paragraphs that demonstrate your understanding of how authentication and authorization are used together for access control. Be sure to include how the access control impacts data confidentiality, integrity, or availability.(150 words)