December 23, 2021 by Admin
Authorization can BEST be accomplished by establishing:
- the ownership of the data.
- what users can do when they are granted system access.
- whether users are who they say they are.
- how users identify themselves to information systems.