Watch this video on YouTube
A security engineer is implementing mechanisms that are used to allow and deny possible actions on the network. What are these mechanisms called?