Employees of the organization need to access information from time to time on a network, but sometimes they lack the appropriate access to modify or read information. Therefore, they need to be granted privileges by the system administrator. Access control involves identifying individuals doing a certain job, authentication using their identification, and giving that individual allowing them to access what they need only and nothing more. In information security, this involves giving someone permission to access a network through user-name and password. It allows employees to do their job by allowing them access to computers, files, software, and other hardware. There are several access control approaches, including; Discretionary Access Control, Role-Based Access Control, and Mandatory Access Control. In Discretionary Access