The ability to adjust access control to the exact amount of permission necessary is called ______________.
Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
___________, generally considered “need to know” access is given based on permissions granted to the user.
__________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.