The basic construct in the establishment of information security regime is regulating how resources which are to be accessed will be protected against network vulnerabilities. The control mechanisms deployed vary in nature, and could be administrative, physical or technical. Access Control is a security method which is being used to grant access and certain authority […]