One of the most important approaches used to secure personal data is ________________, which is the process used to prove the identity of an individual. ______________, however, is the pr ocess used to enable a person’s access privileges.
One of the most important approaches used to secure personal data is Authentication, which is the process used to prove the identity of an individual. Access Contol, however, is the process used to enable a person’s access privileges.