This article discusses access control, its impact on confidentiality, integrity and availability, and the necessary components of access control metric. It also covers contrasting access control for risks, threats and vulnerabilities, and the requirement of maintaining confidentiality, integrity and availability. The subject is Host and Application Security, and the course code, course name, and college/university are not mentioned.