The process of granting or denying access to a network resource. Most computer
security systems are based on a two-step process. The first stage is
authentication, which ensures that a user is who he or she claims to be. The second stage is authorization, which allows the user access to various resources based on the user’s
identity.