Access control is a part of the security policy applied in almost every protected system, including computer systems (networks). In computer systems, access control is carried out in three steps: Authentication (digital identity proofing), Authorisation (assigning rights to resources) and Accounting (monitornig of activities, access to resources, ect.). In order to achieve consistency of access control rules on overall network and to enable easy management of existing policies, but also creation of new ones, centralised systems for network resource access control are used. The use of NAC (Network Access Control) systems, along with access control itself, allows possibility to set up additional restrictions and rules in access to network resources.
Cookies are small text files that are stored on visitor's computer by the websites visited. Cookies are widely used to provide website functionality, or to make the website even more efficient, and are also used to provide certain information to website owners.