The answer in the space provided above is logical access controls. These are tools and protocols that are being used in a computer in a way of having to be used to access information such as identification, authorization or even authentication as a means or protection and ensuring access with security.