Summarize types of authentication protocols and authorization design concepts used in network security.
Examples: Kerberos, attribute-based access control (ABAC)