Watch this video on YouTube
As the IT security manager for a large corporation, you want to implement a system to ensure that only authorized employees can access sensitive company data. Which security mechanism is used to manage and control access to network resources?