Identify the business impact of several access controls.Identify mitigation techniques for weaknesses of each of the access controls.