Step 1: Understanding information security aspects.
In computer security, several principles are used to protect systems and data. These principles include confidentiality, integrity, authorization, authentication, and non-repudiation. Each principle ensures that information systems remain secure and accessible only to legitimate users.
Step 2: Meaning of Authorization.
Authorization refers to the process of granting or denying specific permissions to a user after their identity has been verified. Once a user is authenticated, the system determines what resources and services the user is allowed to access.
This ensures that only authorized and authentic users can use certain system functions or data. For example, administrators may have more permissions than regular users.
Step 3: Evaluation of options.
(A) Authorization: Correct. It ensures that only permitted users can access system resources.
(B) Confidentiality: Incorrect. It ensures that sensitive information is accessible only to authorized individuals but does not control system usage directly.
(C) Non-repudiation: Incorrect. It ensures that a sender cannot deny sending a message or performing a transaction.
(D) Integrity: Incorrect. It ensures that data remains accurate and unaltered.
Step 4: Conclusion.
Thus, the security aspect that ensures only authentic users are allowed to use the system is Authorization.
Final Answer: Authorization.