The types of access that would be given to each person are:
This refers to the model that is used to define states and is a multi-level security protocol that was designed for military applications.
Hence, we can see that based on the security protocols from the highest security clearance to the least, there are different accesses given to each of the persons that want to gain access to a particular type of document.
Read more about security access here:
https://brainly.com/question/14819402
#SPJ1