identify the data that would need to be protected. Recommend how you

would implement one or more of the access controls (listed after the scenarios) for the given scenario and
justify your recommendation.
Scenarios:

Huh?

To identify the data that needs to be protected, we first need to consider the specific scenario at hand. Please provide one of the scenarios mentioned so that I can guide you accordingly.