A key component to IT security is authorization, which is especially important in large, complex organizations with thousands of employees and hundreds of systems. Two methods of authorization are role based access control (RBAC) and attribute based access control (ABAC). Although RBAC and ABAC can provide the same access, which of the following is an advantage of ABAC?In ABAC, roles are expressed more in business terms and thus may be more understandable. In ABAC, roles are expressed more in business terms and thus may be less understandable. none