Orgаnizаtiоns prоtect sensitive dаta by cоmbining access control methods (like role-based access control), network security technologies (like firewalls, IDPS), and monitoring mechanisms (e.g., audit logs). 1. Explain how an RBAC system can be strengthened using a firewall and an auditing mechanism. [10] 2. Give a hospital example showing how these combined measures prevent unauthorized access and detect potential security threats. [10]