An organization is facing significant challenges with not knowing who is accessing what portions of their Information system. What tool or business process should the organization implement to identify:
a. Firewall
b. Encryption
c. Access Control System
d. Data Backup System