Which technique prevents unauthorized access to data and resources?
Authentication
Authorization
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Operating Systems Exercises are loading ...