Describe identification and authentication and authorization
Assume you are a manager in a large international organization. You have been asked to assess the company’s information systems and security controls.
• Describe identification, authentication, and authorization.
• Explore whether or not you would use Windows ACLs and explain your reasoning.
• Evaluate best practices for managing Microsoft Windows and application vulnerabilities.