Rationale

  • There needs to be a way to protect resources from unauthorized access attempts to read, modify, etc. a resource.

[Next]