. "In typical system security, the source of authority to access data or information is a user." . . . .