One of the most important approaches used to secure personal data is ________________, which is the process used to prove the identity of an individual. ______________, however, is the pr ocess used to enable a person’s access privileges.