In information security, it refers to the selective restriction of access to data. It involves authentication (confirming the identity of the person trying to gain access) and authorization (granting access to the system resources based on the user’s privileges).