Certain areas or functionalities may be subject to restricted access. This often means that only permitted individuals or groups will have the ability to view these resources. Justification behind restricted access can range from protecting sensitive information to ensuring system stability. Users who attempt to gain unauthorized access may face pe