Watch this video on YouTube
What is the primary purpose of access control mechanisms within an information security system?