Authentication vs. Authorization: Understanding the Difference in Cybersecurity