Make sure that an idea of separation of obligations is executed and rational obtain controls and account lockout/disabling controls are in place. When the network verifies the identity, the consumer logs in. Authorization then determines the level of access according to network guidelines. This arrangement was dependant on the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network