Slide 1 Slide 2 Access Control Slide 3 Authentication: Who goes there? Determine whether access is allowed Authenticate human to machine Authenticate machine to machine Authorization:…