Respuesta :

Answer: Identification: For access control to be effective, it must provide some way to identify an individual. ...

Authentication: Identification requires authentication. ...

Authorization: The set of actions allowed to a particular identity makes up the meat of authorization.

Explanation: