If we were not to allow users into the system, then we would have no problems of security. However, the system would not be utilized, hence, useless. The system must be used, and there must be security. This means we must find a way to access and authenticate users. This way we improve on the security of the system. In this chapter, we focus on three major security mechanisms from our pool of ... [Show full abstract] security mechanisms. We cover access control, authentication, and authorization. Before we continue, however, let us define the working terms.