Describe identification and authentication and authorization

Assume you are a manager in a large international organization. You have been asked to assess the company’s information systems and security controls.

• Describe identification, authentication, and authorization.

• Explore whether or not you would use Windows ACLs and explain your reasoning.

• Evaluate best practices for managing Microsoft Windows and application vulnerabilities.

find the cost of your paper