ensuring that data are reliably and consistently retrivable in a usable format for authorized users, but no one else. ??? ??? ??? authentication making sure potential users are who they claim to be ??? ??? ??? authorization granting authenticated users approved access to data, softwar, and systems. ??? ??? ??? two-fator authentication authentication based on what users know, such as password and w