9.3. Protecting Against Unauthorized Access and Unauthorized Use Verbal Notes | Foundation of Infromation Technology BIM | TU | TABFlux