Watch this video on YouTube
Mary, an HR manager at XYZ Corp., has been granted access to the HR department's confidential files but not to the finance department's files. Which of the following cybersecurity processes is demonstrated in this scenario?