Imagine you are a cybersecurity consultant tasked with designing authentication and authorization schemes for two distinct systems: an air traffic controller terminal and a school's front office desk computer. Both systems handle sensitive information and require careful consideration of security measures. Your goal is to ensure seamless and efficient access for authorized personnel while minimizing potential risks. Briefly compare the critical security requirements for an air traffic controller terminal and a school's front office desk computer. What unique challenges do each of these systems present in terms of authentication and authorization? Consider factors such as the nature of the information handled, potential consequences of unauthorized access, and the specific roles of personnel. Given the complexity and high-stakes nature of air traffic control operations, discuss which authentication methods would be most suitable for the air traffic controller terminal. Justify your choices by weighing the advantages and disadvantages of various method..