Authorization can BEST be accomplished by establishing:
A. the ownership of the data.
B. what users can do when they are granted system access.
C. whether users are who they say they are.
D. how users identify themselves to information systems.
A. the ownership of the data.
B. what users can do when they are granted system access.
C. whether users are who they say they are.
D. how users identify themselves to information systems.