1 how are authentication and authorization alike and how are they different what is the relationship if any between the two 2 describe the best practice to employ to mitigate malware effects on a machine

There are two question first question it should be Your paper should be 2 pages in length. You need to provide a minimum of two references and need to use APA format in the reference section. for second question 350 words and please add 2 references