Managing users access to the network and the resources on it are vital to protecting your organization s sensitive information. This part discusses strategies for authenticating users and controlling their access to network resources, as well as strategies for securing computers and files on your network.