<P> The need to know principle can be enforced with user access controls and authorization procedures and its objective is to ensure that only authorized individuals gain access to information or systems necessary to undertake their duties . </P> <P> In computer security, general access control includes authorization, authentication, access approval, and audit . A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access . Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token . Authentication methods and tokens include passwords, biometric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems . </P> <P> In any access - control model, the entities that can perform actions on the system are called subjects, and the entities representing resources to which access may need to be controlled are called objects (see also Access Control Matrix). Subjects and objects should both be considered as software entities, rather than as human users: any human users can only have an effect on the system via the software entities that they control . </P> <P> Although some systems equate subjects with user IDs, so that all processes started by a user by default have the same authority, this level of control is not fine - grained enough to satisfy the principle of least privilege, and arguably is responsible for the prevalence of malware in such systems (see computer insecurity). </P>

Name the two levels of access control of a class in the java programming language