1. Identification a. log of events 2. Authentication b. proving as the identity 3. Authorization c. claiming an identity 4. Auditing d. check for violations 5. Accountability e. allow or deny access ITEC106 – Systems Security Mr. John Mark L. Dula