1. Demonstrate how a business can use authentication and authorization technologies to prevent hackers from gaining access to organizational systems.
2. Compare the following Information Systems: • Executive support systems • Decision-support systems Use an example to support your answer.