The ability to adjust access control to the exact amount of permission necessary is called ______________.
Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
___________, generally considered “need to know” access is given based on permissions granted to the user.