cc video for you are working on a project that requires access to sensitive data. You have been told that you need to go through the process of verifying your
You are working on a project that requires access to sensitive data. You have been told that you need to go through the process of verifying your identity before you can be granted access to the resources you need. In an information security system, what is the process of verifying the identity of a user before granting access to resources?