Respuesta :
Answer:
it is known as the IAAA
Explanation:
Identification, authentication, authorization, accounting.
Identification
Identification creates an account or ID that identifies the user, device, or process on the network. This process is used to verify a legitimate user. In some cases, this is where the billing and delivery addresses must match to prevent fraudulent payment methods.
Authentication
Authentication validates a user's identity by asking for specific information, such as a unique username and password or a fingerprint. This is the first major step in access control and must be met before the user goes any farther.
Authorization
Authorization allows users to perform certain actions like accessing, editing, and saving files. Authentication allows users into a system where they can access files and make changes. The authorization process determines where the user has the right to go within a network. Types of users might include administrators, power users, and standard users. Administrators, or "admins," run the show. They decide who can access resources on the network. Power users are typically employees who tend to have a lot of access to features and information. Standard users are usually business partners or vendors whose access is limited to files and information specifically shared with them.
Accounting
Accounting measures the overall access of users by tracking the amount of information they access, the resources they consume, and the number of hours they spend on a session. Everyone's actions are visible on a network. This holds users accountable for their actions. If something goes wrong or sensitive data is leaked, management and administration can track the issue to specific users and timeframes.
Brainleist please! :)