In today's digital landscape, enterprises are facing increasing threats to their sensitive data. Implementing robust network security protocols is essential to preserve valuable information and mitigate the risk of security incidents. A comprehensive access control system should encompass a multi-layered approach, including authentication mechanism