You are looking to implement an access control on your systems resources. The steps of your access control model should follow which logical flow?
A.
Identification, Authorization, Authentication
B.
Authorization, Identification, Authentication
C.
Identification, Authentication, Authorization
D.
Identification, Accountability, Authorization
Explanation:
Identification describes a method of ensuring that a subject (user, program, orprocess) is the entity it claims to be. Identification can be provided with the use of a username or account number. To be properly authenticated, the subject isusually required to provide a second piece to the credential set. This piece could be a password, passphrase, cryptographic key, personal identification number (PIN),anatomical attribute, or token. If the system determines that the subject may accessthe resource, it authorizes the subject.
I choose C
C