Which of the following defines an object as used in access control?
a) Policies, procedures, and technologies that are implemented within a system.
b) Users, applications, or processes that need to be given access.
c) Data, applications, systems, networks, and physical space.
d) Resources, policies, and systems.