Context: Access control is perhaps the first encounter users and perpetrators will have on a network. You will discover how critically important access control is, and you will learn ways you can improve the access control methods of your users on a network. Scenario – You have just been hired as the Access Control lead for your company. The company consists of the following departments: executive team, accounting, human resources, information technology, sales, and operations. You have discovered everyone in the company has full rights across the network, including domain administrator access. You need to document your findings, create an argument in favor of controlling access, and present remediation steps to the Chief Information Officer (CIO) as soon as possible. You may use the Access Control method of your choice. Please justify your position through additional research.