“context aware” and “risk driven” access control are sometimes called context aware and risk driven access control. Context aware access control involves using the attributes of who, what device, from where (location & network) and what data to make real-time decisions about whether or not to authenticate users and permit access to business critical or sensitive data. Risk driven access control treats authentication as a continuous stream of events that are under constant evaluation from the beginning to the end of a session.”]
Source: https://www.csoonline.com/article/3234369/big-picture-security.html

