A subdiscipline of network management. It consists of managing the access to a network using both software and hardware. Typical devices for this are proxy servers, passwords, and cryptography. An important part of this activity is the granting and monitoring of access rights to users.