State the main use of each of the access technologies below. In your answer, give

one example to explain how each access technology can be used to secure a
student record system in a tertiary college.  
Access technologies:
A. Access Control List (ACL).

A. Access Control List (ACL):

The main use of Access Control List (ACL) is to control access to resources or systems by defining permissions for individual users or groups. It enables organizations to specify who can access certain resources and what actions they can perform.

Example for securing a student record system in a tertiary college using ACL:
In a tertiary college, an ACL can be utilized to secure the student record system by granting specific permissions to different individuals or groups involved in the system. For instance, the college administration can create an ACL that allows only authorized personnel such as administrators, academic advisors, and faculty members to view and modify student records. This ensures that sensitive information is only accessible to the relevant personnel, providing a secure environment for managing student records while preventing unauthorized access or modifications.