Answer: Identification: For access control to be effective, it must provide some way to identify an individual. ...
Authentication: Identification requires authentication. ...
Authorization: The set of actions allowed to a particular identity makes up the meat of authorization.
Explanation: