IDNLearn.com makes it easy to find the right answers to your questions. Ask anything and get well-informed, reliable answers from our knowledgeable community members.
The types of access that would be given to each person are:
This refers to the model that is used to define states and is a multi-level security protocol that was designed for military applications.
Hence, we can see that based on the security protocols from the highest security clearance to the least, there are different accesses given to each of the persons that want to gain access to a particular type of document.
Read more about security access here:
https://brainly.com/question/14819402
#SPJ1