OS security mechanisms and access control
Controlling resource access through permissions and policies
Verifying user identity and credentials
Protecting data confidentiality through encryption