Post a concise answer discussing the following topics:
An attacker, in order to harm the system, must firstly be connected to it. Besides preventing or blocking the access for unauthorized persons, the user’s ability to operate in the system has to be limited according to one’s job specifications. These successful restricting access techniques are based on the establishing the identity of the user and are called authentication and authorization.