Question Access Control [WLOs: 1, 2, 3, 5] [CLOs: 1, 4] Prior to beginning work on assignment, please review Chapter 4, 5, and 6 in the (ISC)2 SSCP Systems Security Certified Practitioner: Official Study Guide course textbook. Next, make sure you have completed the Week 2 Lab: Understanding Phishing learning activity in MindTap. The first component of the authentication, authorization, and accounting (AAA) framework is authentication. If you remember, authentication is the process of verifying a user’s identity. That is, determining whether someone or something is who they say they are. For authentication to take place, two pieces of information are required. The first is a form of identification. In a previous lesson, you learned that identification is merely the act of claiming you are someone or something. The most common form of identification is a username. The second required piece of information is something used to verify the claimed identity. And if you remember, this can be several different things; it could be a password, a security token, or even the person’s heartbeat. This information is then compared to the stored information, and if it matches, the user is authenticated, which means that their identity is verified. The second component of AAA is authorization. Authorization should not be confused with authentication. They are two completely different concepts. Authentication is merely the act of verifying a claimed identity. Authorization, on the other hand, is the process of determining whether or not an authenticated user has permission to carry out a specific task or access a system resource. Accounting is the third component of AAA. Accounting tracks the actions of an authenticated user. After an authenticated and authorized user accesses resources, it is important that security professionals are able to track that user’s behavior. This is where accounting comes in. In your paper, Compare the several types of access controls that an IT administrator could use to prevent a security breach. Explain what access control is and how it is used to secure data. Discuss how access control can minimize security breaches into a system using authentication, authorization, and accounting (AAA). Important note: Take into consideration the layering of these processes to discuss more effective network and security management system. The Access Control paper Must be two to four double-spaced pages in length (not including title and references pages) and formatted according to APA Styleas outlined in the Writing Center’s APA Formatting for Microsoft Word. Must include a separate title page with the following: Title of paper in bold font Space should be between title and the rest of the information on the title page. Name of Institution (University of Arizona Global Campus) Course name and number Instructor’s name Date submitted Must utilize academic voice. See the Academic Voice resource for additional guidance. Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper. For assistance on writing Introductions & Conclusions as well as Writing a Thesis Statement, refer to the Writing Center resources. Must use at least one scholarly, peer-reviewed, or credible source in addition to the course text. The Scholarly, Peer-Reviewed, and Other Credible Sources table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment. To assist you in completing the research required for this assignment, view this UAGC Library Quick ‘n’ Dirty tutorial, which introduces the UAGC Library and the research process, and provides some library search tips. Must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your Paper. Must include a separate references page that is formatted according to APA Style as outlined in the Writing Center. See the APA: Formatting Your References List resource in the Writing Center for specifications.