Write a five-seven (5 – 7) page paper in which you:Compare & Contrast access control in relations to risk, threat and vulnerability. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability). Describe access control and its level of importance within operations security. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?) Describe the necessary components within an organization’s access control metric.