The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)
A. Authentication
B. Authorization
C. Access Control
D. Intrusion Prevention