Expand your knowledge base with the help of IDNLearn.com's extensive answer archive. Ask your questions and get detailed, reliable answers from our community of knowledgeable experts.
The types of access that would be given to each person are:
This refers to the model that is used to define states and is a multi-level security protocol that was designed for military applications.
Hence, we can see that based on the security protocols from the highest security clearance to the least, there are different accesses given to each of the persons that want to gain access to a particular type of document.
Read more about security access here:
https://brainly.com/question/14819402
#SPJ1