Access Controls and Security Mechanisms For each of the applications and systems that were described in IP 2, describe the access control mechanisms that are needed for each.
Describe how the new expanded network can be protected through access control. Describe SSO and VPN technology, and discuss whether they can be used in the company.